Cyber Posture

CVE-2025-2725

High

Published: 25 March 2025

Published
25 March 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0092 76.0th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse Unix shell commands and scripts for execution.

Security Summary

CVE-2025-2725 is a critical command injection vulnerability (CVSS 8.0; CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) affecting an unknown functionality in the /api/login/auth file of the HTTP POST Request Handler component. The vulnerability impacts H3C Magic NX15, Magic NX30 Pro, Magic NX400, Magic R3010, and Magic BE18000 routers running versions up to V100R014. It is classified under CWE-74 and CWE-77.

Exploitation requires an attacker positioned within the local network (adjacent network access), possessing low privileges (PR:L), and involves low-complexity manipulation of HTTP POST requests with no user interaction required. Successful attacks enable arbitrary command injection, resulting in high impacts to confidentiality, integrity, and availability.

Advisories recommend upgrading the affected component to a patched version. Relevant resources include the H3C software download portal at https://www.h3c.com/cn/Service/Document_Software/Software_Download/Consume_product/, VulDB entries detailing the issue (https://vuldb.com/?ctiid.300745, https://vuldb.com/?id.300745, https://vuldb.com/?submit.520390), and a GitHub repository with vulnerability information (https://github.com/ZIKH26/CVE-information/blob/master/H3C/Vulnerability%20Information_1.md).

The exploit has been publicly disclosed and may be actively used by attackers.

Details

CWE(s)
CWE-74CWE-77

MITRE ATT&CK Enterprise Techniques

T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Command injection in HTTP POST handler on router enables remote service exploitation (T1210) for arbitrary Unix shell command execution (T1059.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References