CVE-2025-6559

9.8 CRITICAL

📋 TL;DR

Multiple Sapido wireless router models contain an unauthenticated remote OS command injection vulnerability (CWE-78), allowing attackers to execute arbitrary commands on the device. Affected devices are out of vendor support, leaving users exposed to complete device compromise. This vulnerability affects all users of these unsupported router models.

💻 Affected Systems

Products:
  • Sapido wireless router models (specific models not detailed in provided references)
Versions: All versions of affected models
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All affected models are out of vendor support. No specific model list provided in references.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover leading to persistent backdoor installation, credential theft, network traffic interception, and use as a pivot point to attack internal networks.

🟠

Likely Case

Router compromise leading to DNS hijacking, credential harvesting, botnet recruitment, and network disruption.

🟢

If Mitigated

Limited impact if device is isolated behind firewalls with strict inbound filtering, though lateral movement risk remains.

🌐 Internet-Facing: HIGH - Routers are typically internet-facing devices with direct exposure to attackers.
🏢 Internal Only: MEDIUM - While primarily internet-facing, compromised routers can pivot to internal networks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Unauthenticated remote exploitation with simple command injection makes this highly exploitable.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: N/A

Vendor Advisory: https://www.twcert.org.tw/en/cp-139-10195-69da1-2.html

Restart Required: No

Instructions:

No official patch available. Vendor recommends device replacement.

🔧 Temporary Workarounds

Network Isolation

all

Place router behind firewall with strict inbound filtering to block external exploitation attempts.

Access Restriction

all

Configure firewall rules to restrict management interface access to trusted IPs only.

🧯 If You Can't Patch

  • Immediately replace affected routers with supported models from any vendor
  • Isolate router on dedicated VLAN with no access to critical internal resources

🔍 How to Verify

Check if Vulnerable:

Check router model against affected list in TWCERT advisories. If model matches and device is out of support, assume vulnerable.

Check Version:

Check router web interface or console for model information

Verify Fix Applied:

Only verification is complete device replacement with non-vulnerable hardware.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in router logs
  • Multiple failed login attempts followed by successful access
  • Unexpected configuration changes

Network Indicators:

  • Unusual outbound connections from router
  • DNS queries to suspicious domains
  • Traffic redirection patterns

SIEM Query:

source="router_logs" AND (command="*;*" OR command="*|*" OR command="*`*" OR command="*$(*)")

🔗 References

📤 Share & Export