CVE-2025-4010

| EUVD-2025-16616 HIGH
2025-06-02 [email protected]
8.6
CVSS 4.0
Share

CVSS Vector

CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
Low
User Interaction
None

Lifecycle Timeline

3
Analysis Generated
Mar 14, 2026 - 16:47 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 16:47 euvd
EUVD-2025-16616
CVE Published
Jun 02, 2025 - 07:15 nvd
HIGH 8.6

Description

The Netcom NTC 6200 and NWL 222 series expose a web interface to be configured and set up by operators. Multiple endpoints of the web interface are vulnerable to arbitrary command injection and use insecure hardcoded passwords. Remote authenticated attackers can gain arbitrary code execution with elevated privileges.

Analysis

Critical remote code execution vulnerability affecting Netcom NTC 6200 and NWL 222 series network devices. The vulnerability stems from multiple command injection flaws in the web interface combined with hardcoded credentials, allowing authenticated remote attackers to execute arbitrary commands with elevated privileges. With a CVSS score of 8.6 and an attack vector requiring only adjacent network access and low privileges, this vulnerability poses significant risk to organizations deploying these devices in networked environments.

Technical Context

The Netcom NTC 6200 and NWL 222 series devices expose a web-based management interface for device configuration and operation. The vulnerability root cause is classified as CWE-77 (Improper Neutralization of Special Elements used in a Command 'Command Injection'), indicating that user-supplied input to multiple web endpoints is not properly sanitized before being passed to shell command execution functions. The underlying technology involves HTTP/HTTPS web interfaces that process operator-supplied configuration parameters. The presence of hardcoded credentials compounds this issue by reducing the authentication barrier—attackers may leverage default or embedded credentials to bypass initial access controls. The affected CPE strings are implied to be: cpe:2.3:a:netcom:ntc_6200:*:* and cpe:2.3:a:netcom:nwl_222:*:*, though specific version ranges are not detailed in the provided description.

Affected Products

Netcom NTC 6200 series (all versions until patched). Netcom NWL 222 series (all versions until patched). The advisory references and patch versions are not provided in the intelligence data; however, affected organizations should immediately check Netcom's official security advisories at https://www.netcom.com/security or contact their Netcom support representative for version-specific patch information. The vulnerability affects web interface endpoints used for device configuration, implying all deployment scenarios where the web management interface is accessible are at risk.

Remediation

Immediate actions: (1) Restrict network access to the web management interface via network segmentation (firewall rules limiting access to trusted administrator networks only). (2) Change any default/hardcoded credentials if alternative authentication mechanisms exist. (3) Monitor access logs for suspicious configuration attempts. Long-term: (1) Apply security patches from Netcom as released (check Netcom security advisories for specific patch versions). (2) Implement network-based input validation or WAF rules to block command injection payloads if patches are not immediately available. (3) Disable the web management interface if not required, using serial console or out-of-band management instead. (4) Implement network segmentation to ensure management traffic is isolated from general network traffic.

Priority Score

43
Low Medium High Critical
KEV: 0
EPSS: +0.2
CVSS: +43
POC: 0

Share

CVE-2025-4010 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy