CVE-2025-48469

| EUVD-2025-28231 CRITICAL
2025-06-24 5f57b9bf-260d-4433-bf07-b6a79e9bb7d4
9.6
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 15, 2026 - 22:36 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 22:36 euvd
EUVD-2025-28231
PoC Detected
Jul 09, 2025 - 15:21 vuln.today
Public exploit code
CVE Published
Jun 24, 2025 - 03:15 nvd
CRITICAL 9.6

Description

Successful exploitation of the vulnerability could allow an unauthenticated attacker to upload firmware through a public update page, potentially leading to backdoor installation or privilege escalation.

Analysis

A privilege escalation vulnerability (CVSS 9.6) that allows an unauthenticated attacker. Risk factors: public PoC available.

Technical Context

CWE-306 (Missing Authentication). CVSS 9.6 indicates critical severity with likely remote exploitation vector.

Affected Products

['Unspecified product']

Remediation

Monitor vendor channels for patch availability. Restrict network access to affected components and enable MFA as interim mitigation.

Priority Score

68
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +48
POC: +20

Share

CVE-2025-48469 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy