CVE-2025-13184

Firmware · Firmware on Multiple Products, specifically impacting the X5000R model.

A critical vulnerability has been discovered in multiple products, allowing an unauthenticated attacker on the network to remotely enable the Telnet service.

Executive summary

A critical vulnerability has been discovered in multiple products, allowing an unauthenticated attacker on the network to remotely enable the Telnet service. This flaw permits the attacker to gain full administrative (root) access to the device without a password, leading to a complete system compromise. This could allow an adversary to intercept network traffic, attack other devices on the network, or disrupt operations.

Vulnerability

This is an authentication bypass vulnerability within the cstecgi.cgi web script. A remote, unauthenticated attacker can send a specially crafted request to this script to enable the Telnet service on the affected device. Once Telnet is enabled, the device allows login to the root account with a blank password, granting the attacker full administrative privileges and the ability to execute arbitrary commands on the underlying operating system.

Business impact

This is a critical severity vulnerability with a CVSS score of 9.8, posing a significant and immediate risk to the organization. Successful exploitation leads to a complete compromise of the network device, which can have severe consequences. These include the interception of sensitive data passing through the device, using the compromised device as a pivot point for lateral movement into the internal network, disrupting network availability (Denial of Service), and enrolling the device into a botnet for use in larger attacks.

Remediation

Immediate Action: The primary remediation is to update the firmware of all affected devices to the latest version provided by the vendor. After patching, administrators should verify that the update has been successfully applied. In addition, monitor for any signs of exploitation by reviewing device and network access logs for suspicious activity.

Proactive Monitoring: Organizations should actively monitor for indicators of compromise. This includes looking for unusual web requests to the cstecgi.cgi script in web server logs, logs indicating the Telnet service has been enabled unexpectedly, and any successful Telnet logins, especially for the root user. Network traffic monitoring should be configured to alert on any Telnet (port 23) connections to or from these devices.

Compensating Controls: If patching cannot be performed immediately, implement the following compensating controls to reduce risk:

  • Use a firewall or Access Control Lists (ACLs) to restrict all access to the device's web-based management interface from untrusted networks.
  • If possible, ensure the Telnet service is explicitly disabled through configuration and monitor for any state changes.
  • Segment the network to isolate these devices from critical internal assets, limiting the potential for lateral movement.

Exploitation status

Public Exploit Available: true

Analyst recommendation

Given the critical severity (CVSS 9.8) of this vulnerability and the potential for complete system compromise, immediate action is required. Organizations are strongly advised to identify all affected devices and apply the vendor-supplied firmware updates without delay. If patching is not immediately feasible, the compensating controls listed above, particularly restricting access to the management interface, must be implemented as a temporary measure. The high likelihood of exploitation means that this vulnerability should be treated as an active threat.