An issue was discovered in Siklu Communications Etherhaul 8010TX and 1200FX devices, Firmware 7.4.0 through 10.7.3 and possibly other previous version...
Description
An issue was discovered in Siklu Communications Etherhaul 8010TX and 1200FX devices, Firmware 7.4.0 through 10.7.3 and possibly other previous versions. The rfpiped service listening on TCP port 555 w...
AI Analyst Comment
Remediation
Update An issue was discovered in Siklu Communications Etherhaul Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
Executive Summary:
A critical vulnerability has been discovered in multiple Siklu Communications Etherhaul wireless radio products. This flaw, with a CVSS score of 9.8, allows a remote, unauthenticated attacker to potentially take complete control of affected devices, leading to network disruption, data interception, and unauthorized access to the broader network infrastructure.
Vulnerability Details
CVE-ID: CVE-2025-57174
Affected Software: Siklu Communications Etherhaul 8010TX, 1200FX, and potentially other products.
Affected Versions: Firmware 7.4.0 through 10.7.3 and possibly other previous versions.
Vulnerability: The vulnerability exists within the
rfpipedservice, which listens on TCP port 555. Based on the critical CVSS score of 9.8, it is highly probable that this service contains a remotely exploitable flaw, such as a buffer overflow or command injection, that can be triggered by a specially crafted network packet. An unauthenticated attacker on the network can exploit this weakness to execute arbitrary code with elevated privileges, effectively gaining full administrative control over the affected device without requiring any user interaction.Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. Successful exploitation could have a severe business impact, as these devices are core network infrastructure components. An attacker could intercept, manipulate, or block all traffic passing through the compromised device, causing a significant denial of service and disrupting business operations. Furthermore, the compromised device could be used as a pivot point to launch further attacks against the internal network, potentially leading to a widespread data breach, financial loss, and reputational damage.
Remediation Plan
Immediate Action: Immediately update affected Siklu Communications Etherhaul devices to the latest patched firmware version provided by the vendor. After patching, monitor for any signs of exploitation attempts and review historical access logs for suspicious connections or activity related to TCP port 555.
Proactive Monitoring: Implement network monitoring to detect and alert on any unauthorized connection attempts to TCP port 555 on Siklu devices. Monitor device logs for unexpected reboots, configuration changes, or anomalous process behavior. Outbound traffic from the devices to unknown destinations should be considered highly suspicious.
Compensating Controls: If patching cannot be performed immediately, implement strict network access control lists (ACLs) or firewall rules to restrict access to TCP port 555. Access should only be permitted from trusted and explicitly authorized management IP addresses. This will limit the attack surface and reduce the risk of exploitation from untrusted networks.
Exploitation Status
Public Exploit Available: false
Analyst Notes: As of the publication date of Sep 15, 2025, there are no known public proof-of-concept exploits or active exploitation campaigns targeting this vulnerability. The vulnerability is not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. However, due to its critical severity and the low complexity of a potential attack, it is highly likely to be targeted by threat actors in the near future.
Analyst Recommendation
Given the critical CVSS score of 9.8, this vulnerability represents a significant and immediate risk to the organization. We strongly recommend that all affected Siklu Etherhaul devices are patched on an emergency basis. If immediate patching is not feasible, the compensating controls of restricting network access to the vulnerable service must be implemented without delay. Organizations should prioritize this remediation to prevent potential network compromise and operational disruption.