CVE-2025-41663

For u-link Management API an unauthenticated remote attacker in a man-in-the-middle position can inject arbitrary commands in responses returned by WWH servers, which are then executed with elevated privileges. To get into such a position, clients would need to use insecure proxy configurations.
Configurations

No configuration.

History

23 Jul 2025, 09:15

Type Values Removed Values Added
Summary (en) An unauthenticated remote attacker in a man-in-the-middle position can inject arbitrary commands in responses returned by WWH servers and gain arbitrary command execution with elevated privileges. (en) For u-link Management API an unauthenticated remote attacker in a man-in-the-middle position can inject arbitrary commands in responses returned by WWH servers, which are then executed with elevated privileges. To get into such a position, clients would need to use insecure proxy configurations.
CVSS v2 : unknown
v3 : 8.1
v2 : unknown
v3 : 9.8

12 Jun 2025, 16:06

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-11 09:15

Updated : 2025-07-23 09:15


NVD link : CVE-2025-41663

Mitre link : CVE-2025-41663

CVE.ORG link : CVE-2025-41663


JSON object : View

Products Affected

No product.

CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')