Vulnerabilites related to Sapido - BRF71n
CVE-2025-6560 (GCVE-0-2025-6560)
Vulnerability from cvelistv5
Published
2025-06-24 02:01
Modified
2025-06-24 16:48
Severity ?
9.3 (Critical) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
VLAI Severity ?
EPSS score ?
CWE
- CWE-256 - Plaintext Storage of a Password
Summary
Multiple wireless router models from Sapido have an Exposure of Sensitive Information vulnerability, allowing unauthenticated remote attackers to directly access a system configuration file and obtain plaintext administrator credentials.
The affected models are out of support; replacing the device is recommended.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-6560", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-06-24T16:47:38.739831Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-24T16:48:18.117Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "BR071n", "vendor": "Sapido", "versions": [ { "status": "affected", "version": "0" } ] }, { "defaultStatus": "unaffected", "product": "BR261c", "vendor": "Sapido", "versions": [ { "status": "affected", "version": "0" } ] }, { "defaultStatus": "unaffected", "product": "BR270n", "vendor": "Sapido", "versions": [ { "status": "affected", "version": "0" } ] }, { "defaultStatus": "unaffected", "product": "BR476n", "vendor": "Sapido", "versions": [ { "status": "affected", "version": "0" } ] }, { "defaultStatus": "unaffected", "product": "BRC70n", "vendor": "Sapido", "versions": [ { "status": "affected", "version": "0" } ] }, { "defaultStatus": "unaffected", "product": "BRC70x", "vendor": "Sapido", "versions": [ { "status": "affected", "version": "0" } ] }, { "defaultStatus": "unaffected", "product": "BRC76n", "vendor": "Sapido", "versions": [ { "status": "affected", "version": "0" } ] }, { "defaultStatus": "unaffected", "product": "BRD70n", "vendor": "Sapido", "versions": [ { "status": "affected", "version": "0" } ] }, { "defaultStatus": "unaffected", "product": "BRE70n", "vendor": "Sapido", "versions": [ { "status": "affected", "version": "0" } ] }, { "defaultStatus": "unaffected", "product": "BRE71n", "vendor": "Sapido", "versions": [ { "status": "affected", "version": "0" } ] }, { "defaultStatus": "unaffected", "product": "BRF61c", "vendor": "Sapido", "versions": [ { "status": "affected", "version": "0" } ] }, { "defaultStatus": "unaffected", "product": "BRF71n", "vendor": "Sapido", "versions": [ { "status": "affected", "version": "0" } ] } ], "datePublic": "2025-06-24T01:55:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Multiple wireless router models from Sapido have an Exposure of Sensitive Information vulnerability, allowing unauthenticated remote attackers to directly access a system configuration file and obtain plaintext administrator credentials.\u0026nbsp;\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe affected models are out of support; replacing the device is recommended.\u003c/span\u003e" } ], "value": "Multiple wireless router models from Sapido have an Exposure of Sensitive Information vulnerability, allowing unauthenticated remote attackers to directly access a system configuration file and obtain plaintext administrator credentials.\u00a0\n\nThe affected models are out of support; replacing the device is recommended." } ], "impacts": [ { "capecId": "CAPEC-37", "descriptions": [ { "lang": "en", "value": "CAPEC-37 Retrieve Embedded Sensitive Data" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 9.3, "baseSeverity": "CRITICAL", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] }, { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-256", "description": "CWE-256 Plaintext Storage of a Password", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-24T02:01:22.300Z", "orgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "shortName": "twcert" }, "references": [ { "tags": [ "third-party-advisory" ], "url": "https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html" }, { "tags": [ "third-party-advisory" ], "url": "https://www.twcert.org.tw/en/cp-139-10198-55217-2.html" } ], "source": { "advisory": "TVN-202506007", "discovery": "EXTERNAL" }, "tags": [ "unsupported-when-assigned" ], "title": "Sapido Wireless Router - Exposure of Sensitive Information", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "assignerShortName": "twcert", "cveId": "CVE-2025-6560", "datePublished": "2025-06-24T02:01:22.300Z", "dateReserved": "2025-06-24T01:24:45.808Z", "dateUpdated": "2025-06-24T16:48:18.117Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-6559 (GCVE-0-2025-6559)
Vulnerability from cvelistv5
Published
2025-06-24 01:47
Modified
2025-06-24 15:32
Severity ?
9.3 (Critical) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
VLAI Severity ?
EPSS score ?
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
Multiple wireless router models from Sapido have an OS Command Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary OS commands and execute them on the server. The affected models are out of support; replacing the device is recommended.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-6559", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-06-24T15:27:36.396380Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-24T15:32:51.258Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "BR071n", "vendor": "Sapido", "versions": [ { "status": "affected", "version": "0" } ] }, { "defaultStatus": "unaffected", "product": "BR261c", "vendor": "Sapido", "versions": [ { "status": "affected", "version": "0" } ] }, { "defaultStatus": "unaffected", "product": "BR270n", "vendor": "Sapido", "versions": [ { "status": "affected", "version": "0" } ] }, { "defaultStatus": "unaffected", "product": "BR476n", "vendor": "Sapido", "versions": [ { "status": "affected", "version": "0" } ] }, { "defaultStatus": "unaffected", "product": "BRC70n", "vendor": "Sapido", "versions": [ { "status": "affected", "version": "0" } ] }, { "defaultStatus": "unaffected", "product": "BRC70x", "vendor": "Sapido", "versions": [ { "status": "affected", "version": "0" } ] }, { "defaultStatus": "unaffected", "product": "BRC76n", "vendor": "Sapido", "versions": [ { "status": "affected", "version": "0" } ] }, { "defaultStatus": "unaffected", "product": "BRD70n", "vendor": "Sapido", "versions": [ { "status": "affected", "version": "0" } ] }, { "defaultStatus": "unaffected", "product": "BRE70n", "vendor": "Sapido", "versions": [ { "status": "affected", "version": "0" } ] }, { "defaultStatus": "unaffected", "product": "BRE71n", "vendor": "Sapido", "versions": [ { "status": "affected", "version": "0" } ] }, { "defaultStatus": "unaffected", "product": "BRF61c", "vendor": "Sapido", "versions": [ { "status": "affected", "version": "0" } ] }, { "defaultStatus": "unaffected", "product": "BRF71n", "vendor": "Sapido", "versions": [ { "status": "affected", "version": "0" } ] } ], "datePublic": "2025-06-24T01:37:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Multiple wireless router models from Sapido have an OS Command Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary OS commands and execute them on the server.\u0026nbsp;The affected models are out of support; replacing the device is recommended." } ], "value": "Multiple wireless router models from Sapido have an OS Command Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary OS commands and execute them on the server.\u00a0The affected models are out of support; replacing the device is recommended." } ], "impacts": [ { "capecId": "CAPEC-88", "descriptions": [ { "lang": "en", "value": "CAPEC-88 OS Command Injection" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 9.3, "baseSeverity": "CRITICAL", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] }, { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-24T01:47:25.776Z", "orgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "shortName": "twcert" }, "references": [ { "tags": [ "third-party-advisory" ], "url": "https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html" }, { "tags": [ "third-party-advisory" ], "url": "https://www.twcert.org.tw/en/cp-139-10195-69da1-2.html" } ], "source": { "advisory": "TVN-202506006", "discovery": "EXTERNAL" }, "tags": [ "unsupported-when-assigned" ], "title": "Sapido Wireless Router - OS Command Injection", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "assignerShortName": "twcert", "cveId": "CVE-2025-6559", "datePublished": "2025-06-24T01:47:25.776Z", "dateReserved": "2025-06-24T01:24:44.230Z", "dateUpdated": "2025-06-24T15:32:51.258Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }