An authentication bypass vulnerability in the /web/um_open_telnet.cgi endpoint in Nexxt Solutions NCM-X1800 Mesh Router firmware UV1.2.7 and below, allowing an attacker to remotely enable the Telnet service without authentication, bypassing security controls. The Telnet server is then accessible with hard-coded credentials, allowing attackers to gain administrative shell access and execute arbitrary commands on the device.
Metrics
Affected Vendors & Products
References
History
Wed, 16 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
Tue, 15 Jul 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-287 CWE-798 |
|
Metrics |
cvssV3_1
|
Tue, 15 Jul 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An authentication bypass vulnerability in the /web/um_open_telnet.cgi endpoint in Nexxt Solutions NCM-X1800 Mesh Router firmware UV1.2.7 and below, allowing an attacker to remotely enable the Telnet service without authentication, bypassing security controls. The Telnet server is then accessible with hard-coded credentials, allowing attackers to gain administrative shell access and execute arbitrary commands on the device. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-07-15T00:00:00.000Z
Updated: 2025-07-15T14:23:54.882Z
Reserved: 2025-06-16T00:00:00.000Z
Link: CVE-2025-52376

Updated: 2025-07-15T14:22:59.995Z

Status : Awaiting Analysis
Published: 2025-07-15T14:15:30.540
Modified: 2025-07-15T20:07:28.023
Link: CVE-2025-52376

No data.