CVE-2025-6559

| EUVD-2025-19048 CRITICAL
2025-06-24 [email protected]
9.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 15, 2026 - 22:36 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 22:36 euvd
EUVD-2025-19048
CVE Published
Jun 24, 2025 - 03:15 nvd
CRITICAL 9.8

Description

Multiple wireless router models from Sapido have an OS Command Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary OS commands and execute them on the server. The affected models are out of support; replacing the device is recommended.

Analysis

CVE-2025-6559 is an unauthenticated OS Command Injection vulnerability affecting multiple Sapido wireless router models that are out of support. Remote attackers can inject and execute arbitrary operating system commands with no authentication required, achieving complete system compromise. The CVSS 9.8 Critical severity reflects the trivial attack vector (network-accessible, no user interaction required) and complete impact on confidentiality, integrity, and availability.

Technical Context

This vulnerability exploits improper input validation in OS command execution paths within Sapido router firmware (affected CPE families likely include cpe:2.3:o:sapido:router_firmware). CWE-78 (Improper Neutralization of Special Elements used in an OS Command) indicates the firmware fails to sanitize user-supplied input before passing it to shell command execution functions (likely system(), popen(), exec() or similar OS-level calls). This is a classic command injection flaw where special shell metacharacters (`;`, `|`, `&`, `$()`, backticks, etc.) are not filtered, allowing attackers to chain arbitrary commands. Given Sapido's consumer router product line, the vulnerable code is likely in web interface request handlers or management protocol parsers that accept configuration or diagnostic parameters.

Affected Products

Sapido wireless router product line, specific models and firmware versions not fully enumerated in the provided data. Affected product range is indicated as 'multiple wireless router models' with out-of-support status, suggesting legacy consumer router lines (likely Sapido RB models, RT models, or similar from their product catalog circa 2015-2022). Without vendor advisory details, assume all Sapido router firmware versions prior to end-of-support date are vulnerable. Likely CPE match: cpe:2.3:o:sapido:*:*:*:*:*:*:*:*:* for all Sapido router firmware. Consult Sapido's product lifecycle documentation or CISA KEV catalog for definitive model/version enumeration if available.

Remediation

No vendor patch is available; devices are out-of-support. Remediation options: (1) REPLACEMENT (recommended): Retire affected Sapido routers and replace with current-generation hardware from vendors maintaining active security support; (2) NETWORK ISOLATION: If replacement is not immediate, isolate vulnerable routers from untrusted networks via air-gap, restricted VLAN, or disabling remote management (WAN access to admin interface); (3) FIRMWARE AUDIT: Check for third-party firmware projects (OpenWrt, DD-WRT) offering community patches for Sapido hardware—some legacy routers receive community support beyond vendor EOL; (4) MONITORING: Implement network IDS/IPS rules to detect OS command injection payloads (signatures for shell metacharacters in HTTP parameters to router management ports); (5) ACCESS CONTROLS: Restrict router management interface access to trusted internal IPs only, disable UPnP, and change default credentials. Do NOT rely on firmware updates from Sapido—device must be replaced for genuine security remediation.

Priority Score

49
Low Medium High Critical
KEV: 0
EPSS: +0.4
CVSS: +49
POC: 0

Share

CVE-2025-6559 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy