Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-43989

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-13 Aug, 2025 | 00:00
Updated At-13 Aug, 2025 | 20:30
Rejected At-
Credits

The /goform/formJsonAjaxReq POST endpoint of Shenzhen Tuoshi NR500-EA RG500UEAABxCOMSLICv3.4.2731.16.43 devices mishandles the set_timesetting action with the ntpserver0 parameter, which is used in a system command. By setting a username=admin cookie (bypassing normal session checks), an unauthenticated attacker can use that parameter to execute arbitrary OS commands.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:13 Aug, 2025 | 00:00
Updated At:13 Aug, 2025 | 20:30
Rejected At:
▼CVE Numbering Authority (CNA)

The /goform/formJsonAjaxReq POST endpoint of Shenzhen Tuoshi NR500-EA RG500UEAABxCOMSLICv3.4.2731.16.43 devices mishandles the set_timesetting action with the ntpserver0 parameter, which is used in a system command. By setting a username=admin cookie (bypassing normal session checks), an unauthenticated attacker can use that parameter to execute arbitrary OS commands.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/actuator/cve/tree/main/Tuoshi
N/A
https://drive.proton.me/urls/H7J1DPNA00#XrmRLENzyZAp
N/A
https://drive.proton.me/urls/QDVK6E2SBR#8LlpbHWzHdmr
N/A
https://github.com/actuator/cve/blob/main/Tuoshi/CVE-2025-43989.txt
N/A
Hyperlink: https://github.com/actuator/cve/tree/main/Tuoshi
Resource: N/A
Hyperlink: https://drive.proton.me/urls/H7J1DPNA00#XrmRLENzyZAp
Resource: N/A
Hyperlink: https://drive.proton.me/urls/QDVK6E2SBR#8LlpbHWzHdmr
Resource: N/A
Hyperlink: https://github.com/actuator/cve/blob/main/Tuoshi/CVE-2025-43989.txt
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-78CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Type: CWE
CWE ID: CWE-78
Description: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Metrics
VersionBase scoreBase severityVector
3.16.5MEDIUM
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N
Version: 3.1
Base score: 6.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:13 Aug, 2025 | 19:15
Updated At:14 Aug, 2025 | 13:11

The /goform/formJsonAjaxReq POST endpoint of Shenzhen Tuoshi NR500-EA RG500UEAABxCOMSLICv3.4.2731.16.43 devices mishandles the set_timesetting action with the ntpserver0 parameter, which is used in a system command. By setting a username=admin cookie (bypassing normal session checks), an unauthenticated attacker can use that parameter to execute arbitrary OS commands.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.16.5MEDIUM
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N
Type: Secondary
Version: 3.1
Base score: 6.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-78Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-78
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://drive.proton.me/urls/H7J1DPNA00#XrmRLENzyZApcve@mitre.org
N/A
https://drive.proton.me/urls/QDVK6E2SBR#8LlpbHWzHdmrcve@mitre.org
N/A
https://github.com/actuator/cve/blob/main/Tuoshi/CVE-2025-43989.txtcve@mitre.org
N/A
https://github.com/actuator/cve/tree/main/Tuoshicve@mitre.org
N/A
Hyperlink: https://drive.proton.me/urls/H7J1DPNA00#XrmRLENzyZAp
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://drive.proton.me/urls/QDVK6E2SBR#8LlpbHWzHdmr
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://github.com/actuator/cve/blob/main/Tuoshi/CVE-2025-43989.txt
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://github.com/actuator/cve/tree/main/Tuoshi
Source: cve@mitre.org
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

0Records found

Details not found