For u-link Management API an unauthenticated remote attacker in a man-in-the-middle position can inject arbitrary commands in responses returned by WWH servers, which are then executed with elevated privileges. To get into such a position, clients would need to use insecure proxy configurations.
References
Link | Resource |
---|---|
https://certvde.com/en/advisories/VDE-2025-052 |
Configurations
No configuration.
History
23 Jul 2025, 09:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) For u-link Management API an unauthenticated remote attacker in a man-in-the-middle position can inject arbitrary commands in responses returned by WWH servers, which are then executed with elevated privileges. To get into such a position, clients would need to use insecure proxy configurations. | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
12 Jun 2025, 16:06
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-11 09:15
Updated : 2025-07-23 09:15
NVD link : CVE-2025-41663
Mitre link : CVE-2025-41663
CVE.ORG link : CVE-2025-41663
JSON object : View
Products Affected
No product.
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')