CVE-2025-11300

security · security Multiple Products

A high-severity vulnerability has been discovered in specific network devices, allowing a remote, unauthenticated attacker to potentially take complete control of the affected system.

Executive summary

A high-severity vulnerability has been discovered in specific network devices, allowing a remote, unauthenticated attacker to potentially take complete control of the affected system. Successful exploitation of this flaw could lead to network-wide compromise, data theft, or service disruption, posing a significant risk to the organization's security and operations.

Vulnerability

This vulnerability is a remote code execution (RCE) flaw in the device's web administration interface. An unauthenticated attacker on the same network or, if the interface is exposed to the internet, from anywhere in the world, can send a specially crafted HTTP request to the device. This request exploits a command injection weakness, allowing the attacker to execute arbitrary commands on the underlying operating system with the highest level of privileges.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.8. A successful exploit would grant an attacker complete control over the network device, leading to severe business consequences. An attacker could intercept, read, or modify all network traffic passing through the device, resulting in the theft of sensitive data and credentials. The compromised device could also be used as a pivot point to launch further attacks against the internal network, or be co-opted into a botnet for use in external attacks, causing significant reputational damage and potential legal liability.

Remediation

Immediate Action: Immediately identify all affected devices within the environment and apply the security updates provided by the vendor. After patching, review device access and administrative logs for any signs of compromise, such as unauthorized configuration changes, unexpected reboots, or connections from unknown IP addresses.

Proactive Monitoring: Implement enhanced monitoring of network traffic to and from affected devices. Security teams should look for unusual outbound connections, malformed HTTP requests to the device's management interface, and anomalies in data flow. Configure logging to capture all administrative actions and review these logs regularly for suspicious activity.

Compensating Controls: If immediate patching is not feasible, the following controls should be implemented:

  • Disable remote (WAN) management of the device's administrative interface.
  • Restrict access to the administrative interface to a specific, secured management VLAN.
  • Use a firewall to explicitly deny all unauthorized attempts to connect to the device's management ports.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high CVSS score of 8.8, this vulnerability presents a critical risk and should be remediated with the highest priority. We strongly recommend that all organizations apply the vendor-supplied security updates to all affected devices immediately. Although this CVE is not currently listed on the CISA KEV catalog, its severity makes it a prime candidate for future inclusion and a high-value target for attackers. If patching cannot be performed immediately, implement the compensating controls outlined above to reduce the attack surface and monitor systems closely for any signs of exploitation.