CVE-2025-68914

6.5 MEDIUM

📋 TL;DR

This vulnerability allows SQL injection through the username parameter in the login.cgi endpoint of Riello UPS NetMan 208 Application. Attackers can execute arbitrary SQL commands, potentially deleting critical database tables like LOGINFAILEDTABLE. Organizations using affected versions of this UPS management software are at risk.

💻 Affected Systems

Products:
  • Riello UPS NetMan 208 Application
Versions: All versions before 1.12
Operating Systems: Any OS running the NetMan 208 application
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web interface component of the UPS management software.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise leading to data destruction, authentication bypass, or remote code execution on the underlying system.

🟠

Likely Case

Database manipulation including deletion of authentication logs, extraction of credentials, or disruption of UPS monitoring functionality.

🟢

If Mitigated

Limited impact if proper input validation and database permissions are enforced, though SQL injection attempts would still be logged.

🌐 Internet-Facing: HIGH - If exposed to the internet, attackers can directly exploit this vulnerability without network access.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection in login endpoint typically requires minimal technical skill to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 1.12 or later

Vendor Advisory: https://github.com/gerico-lab/riello-multiple-vulnerabilities-2025

Restart Required: Yes

Instructions:

1. Download version 1.12 or later from Riello official sources. 2. Backup current configuration. 3. Install the update following vendor instructions. 4. Restart the NetMan 208 service.

🔧 Temporary Workarounds

Network Segmentation

linux

Restrict access to the NetMan 208 web interface to trusted networks only.

iptables -A INPUT -p tcp --dport 80 -s TRUSTED_NETWORK -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s TRUSTED_NETWORK -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

Web Application Firewall

all

Deploy WAF rules to block SQL injection patterns targeting login.cgi.

# Configure WAF to block SQL injection patterns in login parameters

🧯 If You Can't Patch

  • Implement strict network access controls to isolate the NetMan 208 system from untrusted networks.
  • Deploy a web application firewall with SQL injection detection rules in front of the application.

🔍 How to Verify

Check if Vulnerable:

Check if version is below 1.12 via web interface or configuration files. Test login endpoint with SQL injection payloads in username parameter.

Check Version:

Check web interface footer or configuration files for version information. No universal CLI command available.

Verify Fix Applied:

Verify version is 1.12 or higher. Test login endpoint with SQL injection payloads to confirm they are properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL errors in application logs
  • Multiple failed login attempts with SQL-like patterns in username field
  • Database error messages containing SQL syntax

Network Indicators:

  • HTTP POST requests to /cgi-bin/login.cgi with SQL keywords in parameters
  • Unusual database connection patterns from web server

SIEM Query:

source="netman_logs" AND (message="*SQL*" OR message="*syntax*" OR username="*' OR *")

🔗 References

📤 Share & Export