Search criteria
2 vulnerabilities found for POWER13 by Netcore
CVE-2025-5145 (GCVE-0-2025-5145)
Vulnerability from cvelistv5 – Published: 2025-05-25 05:31 – Updated: 2025-07-11 08:41
VLAI?
Title
Netcore POWER13 Query String cgi-bin command injection
Summary
A vulnerability, which was classified as critical, was found in Netcore NBR1005GPEV2, B6V2, COVER5, NAP830, NAP930, NBR100V2, NBR200V2 and POWER13 up to 20250508. This affects an unknown part of the file /www/cgi-bin/ of the component Query String Handler. The manipulation leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Severity ?
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Netcore | NBR1005GPEV2 |
Affected:
20250508
|
||
Credits
ricardo123 (VulDB User)
ricardo123 (VulDB User)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-5145",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-28T17:27:50.760045Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-05-28T17:38:57.471Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"modules": [
"Query String Handler"
],
"product": "NBR1005GPEV2",
"vendor": "Netcore",
"versions": [
{
"status": "affected",
"version": "20250508"
}
]
},
{
"modules": [
"Query String Handler"
],
"product": "B6V2",
"vendor": "Netcore",
"versions": [
{
"status": "affected",
"version": "20250508"
}
]
},
{
"modules": [
"Query String Handler"
],
"product": "COVER5",
"vendor": "Netcore",
"versions": [
{
"status": "affected",
"version": "20250508"
}
]
},
{
"modules": [
"Query String Handler"
],
"product": "NAP830",
"vendor": "Netcore",
"versions": [
{
"status": "affected",
"version": "20250508"
}
]
},
{
"modules": [
"Query String Handler"
],
"product": "NAP930",
"vendor": "Netcore",
"versions": [
{
"status": "affected",
"version": "20250508"
}
]
},
{
"modules": [
"Query String Handler"
],
"product": "NBR100V2",
"vendor": "Netcore",
"versions": [
{
"status": "affected",
"version": "20250508"
}
]
},
{
"modules": [
"Query String Handler"
],
"product": "NBR200V2",
"vendor": "Netcore",
"versions": [
{
"status": "affected",
"version": "20250508"
}
]
},
{
"modules": [
"Query String Handler"
],
"product": "POWER13",
"vendor": "Netcore",
"versions": [
{
"status": "affected",
"version": "20250508"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "ricardo123 (VulDB User)"
},
{
"lang": "en",
"type": "analyst",
"value": "ricardo123 (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in Netcore NBR1005GPEV2, B6V2, COVER5, NAP830, NAP930, NBR100V2, NBR200V2 and POWER13 up to 20250508. This affects an unknown part of the file /www/cgi-bin/ of the component Query String Handler. The manipulation leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "de",
"value": "Es wurde eine kritische Schwachstelle in Netcore NBR1005GPEV2, B6V2, COVER5, NAP830, NAP930, NBR100V2, NBR200V2 and POWER13 bis 20250508 gefunden. Dabei betrifft es einen unbekannter Codeteil der Datei /www/cgi-bin/ der Komponente Query String Handler. Dank der Manipulation mit unbekannten Daten kann eine command injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 6.5,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-77",
"description": "Command Injection",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-74",
"description": "Injection",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-11T08:41:34.484Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-310233 | Netcore POWER13 Query String cgi-bin command injection",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.310233"
},
{
"name": "VDB-310233 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.310233"
},
{
"name": "Submit #573492 | Netcore NBR1005GPE;COVER5;NBR100;NBR200;POWER13;B6;NAP930;NAP830 NBR1005GPEV2_V1.3.241107.015153;NBR100V2 V1.3.240614.030928; NBR200V2 V1.3.241127.071246;NAP930 V0.1.241010.141410;NAP830 V0.1.2 Command Injection",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.573492"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/Exploo0Osion/netcore_unauth"
},
{
"tags": [
"related"
],
"url": "https://anonymous.4open.science/r/netcore_unauth-7D2E"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-05-24T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2025-05-24T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2025-07-11T10:46:30.000Z",
"value": "VulDB entry last update"
}
],
"title": "Netcore POWER13 Query String cgi-bin command injection"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2025-5145",
"datePublished": "2025-05-25T05:31:04.552Z",
"dateReserved": "2025-05-24T13:36:56.691Z",
"dateUpdated": "2025-07-11T08:41:34.484Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-5145 (GCVE-0-2025-5145)
Vulnerability from nvd – Published: 2025-05-25 05:31 – Updated: 2025-07-11 08:41
VLAI?
Title
Netcore POWER13 Query String cgi-bin command injection
Summary
A vulnerability, which was classified as critical, was found in Netcore NBR1005GPEV2, B6V2, COVER5, NAP830, NAP930, NBR100V2, NBR200V2 and POWER13 up to 20250508. This affects an unknown part of the file /www/cgi-bin/ of the component Query String Handler. The manipulation leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Severity ?
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Netcore | NBR1005GPEV2 |
Affected:
20250508
|
||
Credits
ricardo123 (VulDB User)
ricardo123 (VulDB User)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-5145",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-28T17:27:50.760045Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-05-28T17:38:57.471Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"modules": [
"Query String Handler"
],
"product": "NBR1005GPEV2",
"vendor": "Netcore",
"versions": [
{
"status": "affected",
"version": "20250508"
}
]
},
{
"modules": [
"Query String Handler"
],
"product": "B6V2",
"vendor": "Netcore",
"versions": [
{
"status": "affected",
"version": "20250508"
}
]
},
{
"modules": [
"Query String Handler"
],
"product": "COVER5",
"vendor": "Netcore",
"versions": [
{
"status": "affected",
"version": "20250508"
}
]
},
{
"modules": [
"Query String Handler"
],
"product": "NAP830",
"vendor": "Netcore",
"versions": [
{
"status": "affected",
"version": "20250508"
}
]
},
{
"modules": [
"Query String Handler"
],
"product": "NAP930",
"vendor": "Netcore",
"versions": [
{
"status": "affected",
"version": "20250508"
}
]
},
{
"modules": [
"Query String Handler"
],
"product": "NBR100V2",
"vendor": "Netcore",
"versions": [
{
"status": "affected",
"version": "20250508"
}
]
},
{
"modules": [
"Query String Handler"
],
"product": "NBR200V2",
"vendor": "Netcore",
"versions": [
{
"status": "affected",
"version": "20250508"
}
]
},
{
"modules": [
"Query String Handler"
],
"product": "POWER13",
"vendor": "Netcore",
"versions": [
{
"status": "affected",
"version": "20250508"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "ricardo123 (VulDB User)"
},
{
"lang": "en",
"type": "analyst",
"value": "ricardo123 (VulDB User)"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in Netcore NBR1005GPEV2, B6V2, COVER5, NAP830, NAP930, NBR100V2, NBR200V2 and POWER13 up to 20250508. This affects an unknown part of the file /www/cgi-bin/ of the component Query String Handler. The manipulation leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "de",
"value": "Es wurde eine kritische Schwachstelle in Netcore NBR1005GPEV2, B6V2, COVER5, NAP830, NAP930, NBR100V2, NBR200V2 and POWER13 bis 20250508 gefunden. Dabei betrifft es einen unbekannter Codeteil der Datei /www/cgi-bin/ der Komponente Query String Handler. Dank der Manipulation mit unbekannten Daten kann eine command injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
],
"metrics": [
{
"cvssV4_0": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P",
"version": "4.0"
}
},
{
"cvssV3_1": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
"version": "3.1"
}
},
{
"cvssV3_0": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
"version": "3.0"
}
},
{
"cvssV2_0": {
"baseScore": 6.5,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR",
"version": "2.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-77",
"description": "Command Injection",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-74",
"description": "Injection",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-11T08:41:34.484Z",
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB"
},
"references": [
{
"name": "VDB-310233 | Netcore POWER13 Query String cgi-bin command injection",
"tags": [
"vdb-entry",
"technical-description"
],
"url": "https://vuldb.com/?id.310233"
},
{
"name": "VDB-310233 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
],
"url": "https://vuldb.com/?ctiid.310233"
},
{
"name": "Submit #573492 | Netcore NBR1005GPE;COVER5;NBR100;NBR200;POWER13;B6;NAP930;NAP830 NBR1005GPEV2_V1.3.241107.015153;NBR100V2 V1.3.240614.030928; NBR200V2 V1.3.241127.071246;NAP930 V0.1.241010.141410;NAP830 V0.1.2 Command Injection",
"tags": [
"third-party-advisory"
],
"url": "https://vuldb.com/?submit.573492"
},
{
"tags": [
"exploit"
],
"url": "https://github.com/Exploo0Osion/netcore_unauth"
},
{
"tags": [
"related"
],
"url": "https://anonymous.4open.science/r/netcore_unauth-7D2E"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-05-24T00:00:00.000Z",
"value": "Advisory disclosed"
},
{
"lang": "en",
"time": "2025-05-24T02:00:00.000Z",
"value": "VulDB entry created"
},
{
"lang": "en",
"time": "2025-07-11T10:46:30.000Z",
"value": "VulDB entry last update"
}
],
"title": "Netcore POWER13 Query String cgi-bin command injection"
}
},
"cveMetadata": {
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"cveId": "CVE-2025-5145",
"datePublished": "2025-05-25T05:31:04.552Z",
"dateReserved": "2025-05-24T13:36:56.691Z",
"dateUpdated": "2025-07-11T08:41:34.484Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}