Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2025-41673
Analyzed
More InfoOfficial Page
Source-info@cert.vde.com
View Known Exploited Vulnerability (KEV) details
Published At-21 Jul, 2025 | 10:15
Updated At-06 Nov, 2025 | 16:45

A high privileged remote attacker can execute arbitrary system commands via POST requests in the send_sms action due to improper neutralization of special elements used in an OS command.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.17.2HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 7.2
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CPE Matches

mbconnectline
mbconnectline
>>mbnet.mini_firmware>>Versions before 2.3.3(exclusive)
cpe:2.3:o:mbconnectline:mbnet.mini_firmware:*:*:*:*:*:*:*:*
mbconnectline
mbconnectline
>>mbnet.mini>>-
cpe:2.3:h:mbconnectline:mbnet.mini:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-78Secondaryinfo@cert.vde.com
CWE ID: CWE-78
Type: Secondary
Source: info@cert.vde.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://certvde.com/de/advisories/VDE-2025-058info@cert.vde.com
Vendor Advisory
http://seclists.org/fulldisclosure/2025/Jul/38af854a3a-2127-422b-91ae-364da2661108
Mailing List
Hyperlink: https://certvde.com/de/advisories/VDE-2025-058
Source: info@cert.vde.com
Resource:
Vendor Advisory
Hyperlink: http://seclists.org/fulldisclosure/2025/Jul/38
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Change History
0Changes found

Details not found