CVE-2025-9974

ONT/Beacon · Unified WEBUI

An input handling flaw in the ONT/Beacon Unified WEBUI allows authenticated users to execute unintended system-level commands.

Executive summary

The Unified WEBUI application on ONT/Beacon devices is vulnerable to authenticated command execution, posing a significant risk to network infrastructure integrity.

Vulnerability

The vulnerability exists due to improper validation of user-supplied input within the WEBUI management interface. An authenticated attacker can leverage this flaw to trigger system-level command execution on the underlying operating system of the device.

Business impact

The impact of this vulnerability is severe, as reflected by its CVSS score of 8.8. An attacker with valid credentials could gain full control over the ONT/Beacon device, leading to unauthorized network configuration changes, data interception, or a complete denial of service for connected clients. For service providers, this could result in significant operational disruption and a loss of customer trust.

Remediation

Immediate Action: Update the device firmware to the latest version provided by the manufacturer to patch the input handling logic.

Proactive Monitoring: Audit management logs for the WEBUI to identify any unusual command execution patterns or unauthorized administrative logins.

Compensating Controls: Limit access to the WEBUI management interface to a dedicated management VLAN and enforce strong multi-factor authentication for all administrative accounts.

Exploitation status

Public Exploit Available: false

Analyst recommendation

This vulnerability represents a critical risk to the management plane of networking hardware. Security teams must ensure that all ONT/Beacon devices are updated immediately. Furthermore, the principle of least privilege should be applied to all WEBUI accounts to minimize the potential attack surface.