Search criteria

3 vulnerabilities by Netcore

CVE-2025-5147 (GCVE-0-2025-5147)

Vulnerability from cvelistv5 – Published: 2025-05-25 11:31 – Updated: 2025-05-29 07:00
VLAI?
Title
Netcore NBR1005GPEV2/NBR200V2/B6V2 network_tools tools_ping command injection
Summary
A vulnerability was found in Netcore NBR1005GPEV2, NBR200V2 and B6V2 up to 20250508 and classified as critical. This issue affects the function tools_ping of the file /usr/bin/network_tools. The manipulation of the argument url leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
CWE
Assigner
References
Impacted products
Credits
ricardo123 (VulDB User) ricardo123 (VulDB User)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-5147",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-28T17:27:27.067640Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-28T17:38:46.778Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "NBR1005GPEV2",
          "vendor": "Netcore",
          "versions": [
            {
              "status": "affected",
              "version": "20250508"
            }
          ]
        },
        {
          "product": "NBR200V2",
          "vendor": "Netcore",
          "versions": [
            {
              "status": "affected",
              "version": "20250508"
            }
          ]
        },
        {
          "product": "B6V2",
          "vendor": "Netcore",
          "versions": [
            {
              "status": "affected",
              "version": "20250508"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "ricardo123 (VulDB User)"
        },
        {
          "lang": "en",
          "type": "analyst",
          "value": "ricardo123 (VulDB User)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability was found in Netcore NBR1005GPEV2, NBR200V2 and B6V2 up to 20250508 and classified as critical. This issue affects the function tools_ping of the file /usr/bin/network_tools. The manipulation of the argument url leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        },
        {
          "lang": "de",
          "value": "Eine kritische Schwachstelle wurde in Netcore NBR1005GPEV2, NBR200V2 and B6V2 bis 20250508 gefunden. Davon betroffen ist die Funktion tools_ping der Datei /usr/bin/network_tools. Mit der Manipulation des Arguments url mit unbekannten Daten kann eine command injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
            "version": "4.0"
          }
        },
        {
          "cvssV3_1": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          }
        },
        {
          "cvssV3_0": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.0"
          }
        },
        {
          "cvssV2_0": {
            "baseScore": 6.5,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
            "version": "2.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-77",
              "description": "Command Injection",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-74",
              "description": "Injection",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-29T07:00:52.075Z",
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB"
      },
      "references": [
        {
          "name": "VDB-310235 | Netcore NBR1005GPEV2/NBR200V2/B6V2 network_tools tools_ping command injection",
          "tags": [
            "vdb-entry",
            "technical-description"
          ],
          "url": "https://vuldb.com/?id.310235"
        },
        {
          "name": "VDB-310235 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "tags": [
            "signature",
            "permissions-required"
          ],
          "url": "https://vuldb.com/?ctiid.310235"
        },
        {
          "name": "Submit #573682 | Netcore NBR1005GPE;  NBR200; B6; NBR1005GPEV2_V1.3.241107.015153; NBR200V2 V1.3.241127.071246; B6V2 V1.3.241113.062722;  Command Injection",
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://vuldb.com/?submit.573682"
        },
        {
          "tags": [
            "exploit"
          ],
          "url": "https://github.com/Exploo0Osion/netcore_command_injection_3"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2025-05-24T00:00:00.000Z",
          "value": "Advisory disclosed"
        },
        {
          "lang": "en",
          "time": "2025-05-24T02:00:00.000Z",
          "value": "VulDB entry created"
        },
        {
          "lang": "en",
          "time": "2025-05-29T09:02:47.000Z",
          "value": "VulDB entry last update"
        }
      ],
      "title": "Netcore NBR1005GPEV2/NBR200V2/B6V2 network_tools tools_ping command injection"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "cveId": "CVE-2025-5147",
    "datePublished": "2025-05-25T11:31:04.116Z",
    "dateReserved": "2025-05-24T13:37:03.230Z",
    "dateUpdated": "2025-05-29T07:00:52.075Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-5146 (GCVE-0-2025-5146)

Vulnerability from cvelistv5 – Published: 2025-05-25 07:00 – Updated: 2025-05-29 07:00
VLAI?
Title
Netcore NBR200V2 HTTP Header routerd passwd_set command injection
Summary
A vulnerability has been found in Netcore NBR1005GPEV2, B6V2, COVER5, NAP830, NAP930, NBR100V2 and NBR200V2 up to 20250508 and classified as critical. This vulnerability affects the function passwd_set of the file /usr/bin/routerd of the component HTTP Header Handler. The manipulation of the argument pwd leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
CWE
Assigner
References
Credits
ricardo123 (VulDB User) ricardo123 (VulDB User)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-5146",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-28T17:27:41.264532Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-28T17:38:52.307Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "modules": [
            "HTTP Header Handler"
          ],
          "product": "NBR1005GPEV2",
          "vendor": "Netcore",
          "versions": [
            {
              "status": "affected",
              "version": "20250508"
            }
          ]
        },
        {
          "modules": [
            "HTTP Header Handler"
          ],
          "product": "B6V2",
          "vendor": "Netcore",
          "versions": [
            {
              "status": "affected",
              "version": "20250508"
            }
          ]
        },
        {
          "modules": [
            "HTTP Header Handler"
          ],
          "product": "COVER5",
          "vendor": "Netcore",
          "versions": [
            {
              "status": "affected",
              "version": "20250508"
            }
          ]
        },
        {
          "modules": [
            "HTTP Header Handler"
          ],
          "product": "NAP830",
          "vendor": "Netcore",
          "versions": [
            {
              "status": "affected",
              "version": "20250508"
            }
          ]
        },
        {
          "modules": [
            "HTTP Header Handler"
          ],
          "product": "NAP930",
          "vendor": "Netcore",
          "versions": [
            {
              "status": "affected",
              "version": "20250508"
            }
          ]
        },
        {
          "modules": [
            "HTTP Header Handler"
          ],
          "product": "NBR100V2",
          "vendor": "Netcore",
          "versions": [
            {
              "status": "affected",
              "version": "20250508"
            }
          ]
        },
        {
          "modules": [
            "HTTP Header Handler"
          ],
          "product": "NBR200V2",
          "vendor": "Netcore",
          "versions": [
            {
              "status": "affected",
              "version": "20250508"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "ricardo123 (VulDB User)"
        },
        {
          "lang": "en",
          "type": "analyst",
          "value": "ricardo123 (VulDB User)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability has been found in Netcore NBR1005GPEV2, B6V2, COVER5, NAP830, NAP930, NBR100V2 and NBR200V2 up to 20250508 and classified as critical. This vulnerability affects the function passwd_set of the file /usr/bin/routerd of the component HTTP Header Handler. The manipulation of the argument pwd leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        },
        {
          "lang": "de",
          "value": "In Netcore NBR1005GPEV2, B6V2, COVER5, NAP830, NAP930, NBR100V2 and NBR200V2 bis 20250508 wurde eine kritische Schwachstelle gefunden. Hierbei betrifft es die Funktion passwd_set der Datei /usr/bin/routerd der Komponente HTTP Header Handler. Dank Manipulation des Arguments pwd mit unbekannten Daten kann eine command injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
            "version": "4.0"
          }
        },
        {
          "cvssV3_1": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          }
        },
        {
          "cvssV3_0": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.0"
          }
        },
        {
          "cvssV2_0": {
            "baseScore": 6.5,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
            "version": "2.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-77",
              "description": "Command Injection",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-74",
              "description": "Injection",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-29T07:00:40.229Z",
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB"
      },
      "references": [
        {
          "name": "VDB-310234 | Netcore NBR200V2 HTTP Header routerd passwd_set command injection",
          "tags": [
            "vdb-entry",
            "technical-description"
          ],
          "url": "https://vuldb.com/?id.310234"
        },
        {
          "name": "VDB-310234 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "tags": [
            "signature",
            "permissions-required"
          ],
          "url": "https://vuldb.com/?ctiid.310234"
        },
        {
          "name": "Submit #573493 | Netcore NBR1005GPE; COVER5; NBR100; NBR200; B6; NAP930; NAP830 NBR1005GPEV2_V1.3.241107.015153; NBR100V2 V1.3.240614.030928; NBR200V2 V1.3.241127.071246; NAP930 V0.1.241010.141410; NAP830 V0. Command Injection",
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://vuldb.com/?submit.573493"
        },
        {
          "tags": [
            "exploit"
          ],
          "url": "https://github.com/Exploo0Osion/netcore_command_injection_2"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2025-05-24T00:00:00.000Z",
          "value": "Advisory disclosed"
        },
        {
          "lang": "en",
          "time": "2025-05-24T02:00:00.000Z",
          "value": "VulDB entry created"
        },
        {
          "lang": "en",
          "time": "2025-05-29T09:02:37.000Z",
          "value": "VulDB entry last update"
        }
      ],
      "title": "Netcore NBR200V2 HTTP Header routerd passwd_set command injection"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "cveId": "CVE-2025-5146",
    "datePublished": "2025-05-25T07:00:09.594Z",
    "dateReserved": "2025-05-24T13:36:59.953Z",
    "dateUpdated": "2025-05-29T07:00:40.229Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-5145 (GCVE-0-2025-5145)

Vulnerability from cvelistv5 – Published: 2025-05-25 05:31 – Updated: 2025-07-11 08:41
VLAI?
Title
Netcore POWER13 Query String cgi-bin command injection
Summary
A vulnerability, which was classified as critical, was found in Netcore NBR1005GPEV2, B6V2, COVER5, NAP830, NAP930, NBR100V2, NBR200V2 and POWER13 up to 20250508. This affects an unknown part of the file /www/cgi-bin/ of the component Query String Handler. The manipulation leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
CWE
Assigner
Credits
ricardo123 (VulDB User) ricardo123 (VulDB User)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-5145",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-28T17:27:50.760045Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-28T17:38:57.471Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "modules": [
            "Query String Handler"
          ],
          "product": "NBR1005GPEV2",
          "vendor": "Netcore",
          "versions": [
            {
              "status": "affected",
              "version": "20250508"
            }
          ]
        },
        {
          "modules": [
            "Query String Handler"
          ],
          "product": "B6V2",
          "vendor": "Netcore",
          "versions": [
            {
              "status": "affected",
              "version": "20250508"
            }
          ]
        },
        {
          "modules": [
            "Query String Handler"
          ],
          "product": "COVER5",
          "vendor": "Netcore",
          "versions": [
            {
              "status": "affected",
              "version": "20250508"
            }
          ]
        },
        {
          "modules": [
            "Query String Handler"
          ],
          "product": "NAP830",
          "vendor": "Netcore",
          "versions": [
            {
              "status": "affected",
              "version": "20250508"
            }
          ]
        },
        {
          "modules": [
            "Query String Handler"
          ],
          "product": "NAP930",
          "vendor": "Netcore",
          "versions": [
            {
              "status": "affected",
              "version": "20250508"
            }
          ]
        },
        {
          "modules": [
            "Query String Handler"
          ],
          "product": "NBR100V2",
          "vendor": "Netcore",
          "versions": [
            {
              "status": "affected",
              "version": "20250508"
            }
          ]
        },
        {
          "modules": [
            "Query String Handler"
          ],
          "product": "NBR200V2",
          "vendor": "Netcore",
          "versions": [
            {
              "status": "affected",
              "version": "20250508"
            }
          ]
        },
        {
          "modules": [
            "Query String Handler"
          ],
          "product": "POWER13",
          "vendor": "Netcore",
          "versions": [
            {
              "status": "affected",
              "version": "20250508"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "ricardo123 (VulDB User)"
        },
        {
          "lang": "en",
          "type": "analyst",
          "value": "ricardo123 (VulDB User)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability, which was classified as critical, was found in Netcore NBR1005GPEV2, B6V2, COVER5, NAP830, NAP930, NBR100V2, NBR200V2 and POWER13 up to 20250508. This affects an unknown part of the file /www/cgi-bin/ of the component Query String Handler. The manipulation leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        },
        {
          "lang": "de",
          "value": "Es wurde eine kritische Schwachstelle in Netcore NBR1005GPEV2, B6V2, COVER5, NAP830, NAP930, NBR100V2, NBR200V2 and POWER13 bis 20250508 gefunden. Dabei betrifft es einen unbekannter Codeteil der Datei /www/cgi-bin/ der Komponente Query String Handler. Dank der Manipulation mit unbekannten Daten kann eine command injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P",
            "version": "4.0"
          }
        },
        {
          "cvssV3_1": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
            "version": "3.1"
          }
        },
        {
          "cvssV3_0": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
            "version": "3.0"
          }
        },
        {
          "cvssV2_0": {
            "baseScore": 6.5,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR",
            "version": "2.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-77",
              "description": "Command Injection",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-74",
              "description": "Injection",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-11T08:41:34.484Z",
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB"
      },
      "references": [
        {
          "name": "VDB-310233 | Netcore POWER13 Query String cgi-bin command injection",
          "tags": [
            "vdb-entry",
            "technical-description"
          ],
          "url": "https://vuldb.com/?id.310233"
        },
        {
          "name": "VDB-310233 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "tags": [
            "signature",
            "permissions-required"
          ],
          "url": "https://vuldb.com/?ctiid.310233"
        },
        {
          "name": "Submit #573492 | Netcore NBR1005GPE;COVER5;NBR100;NBR200;POWER13;B6;NAP930;NAP830  NBR1005GPEV2_V1.3.241107.015153;NBR100V2 V1.3.240614.030928; NBR200V2 V1.3.241127.071246;NAP930 V0.1.241010.141410;NAP830 V0.1.2 Command Injection",
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://vuldb.com/?submit.573492"
        },
        {
          "tags": [
            "exploit"
          ],
          "url": "https://github.com/Exploo0Osion/netcore_unauth"
        },
        {
          "tags": [
            "related"
          ],
          "url": "https://anonymous.4open.science/r/netcore_unauth-7D2E"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2025-05-24T00:00:00.000Z",
          "value": "Advisory disclosed"
        },
        {
          "lang": "en",
          "time": "2025-05-24T02:00:00.000Z",
          "value": "VulDB entry created"
        },
        {
          "lang": "en",
          "time": "2025-07-11T10:46:30.000Z",
          "value": "VulDB entry last update"
        }
      ],
      "title": "Netcore POWER13 Query String cgi-bin command injection"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "cveId": "CVE-2025-5145",
    "datePublished": "2025-05-25T05:31:04.552Z",
    "dateReserved": "2025-05-24T13:36:56.691Z",
    "dateUpdated": "2025-07-11T08:41:34.484Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}