CVE-2025-52376

Nexxt · Nexxt Solutions NCM-X1800 Mesh Router

A critical authentication bypass vulnerability has been identified in certain Nexxt Solutions mesh routers.

Executive summary

A critical authentication bypass vulnerability has been identified in certain Nexxt Solutions mesh routers. This flaw allows a remote, unauthenticated attacker to enable the Telnet service on a vulnerable device, potentially leading to a full system compromise. Successful exploitation could grant an attacker complete control over the router and the network traffic it manages, posing a severe risk to network security and data confidentiality.

Vulnerability

The vulnerability exists in the /web/um_open_telnet.cgi endpoint of the router's web management interface. This specific CGI script fails to perform any authentication or session validation checks. A remote attacker can send a direct, unauthenticated HTTP request to this endpoint, which will cause the device to enable its Telnet service, granting command-line access to the system.

Business impact

This vulnerability is rated as critical severity with a CVSS score of 9.8. Exploitation by an attacker could lead to a complete compromise of the network perimeter security. An attacker with administrative control of the router can intercept, manipulate, or redirect all network traffic, conduct man-in-the-middle attacks, launch further attacks against internal network assets, exfiltrate sensitive data, or enlist the device into a botnet. This presents a direct and severe risk to the confidentiality, integrity, and availability of the organization's data and network services.

Remediation

Immediate Action: Immediately update the firmware of affected Nexxt Solutions NCM-X1800 Mesh Routers to a version that remediates this vulnerability, as per the vendor's advisory. After patching, organizations should verify that the update was successful and the Telnet service remains disabled unless explicitly required.

Proactive Monitoring: Monitor firewall and web server logs for any access attempts to the /web/um_open_telnet.cgi endpoint. System administrators should regularly audit device configurations for unauthorized changes, particularly the unexpected enabling of services like Telnet. Monitor for unusual outbound network traffic from the router, which could indicate a successful compromise.

Compensating Controls: If patching cannot be performed immediately, restrict all access to the router's web management interface from the internet or other untrusted networks. This can be achieved by implementing strict firewall rules that block access to the device's management ports (e.g., TCP 80, 443) from external IP addresses. Ensure Telnet is manually disabled and monitor for any status changes.

Exploitation status

Public Exploit Available: False

Analyst recommendation

Given the critical CVSS score of 9.8 and the simplicity of exploitation, we strongly recommend that organizations prioritize the immediate patching of all vulnerable Nexxt Solutions routers. The risk of a full network compromise is severe. If patching is delayed for any reason, the compensating controls outlined above, especially restricting external access to the management interface, must be implemented as an urgent priority to mitigate the immediate threat.