Cyber Posture

CVE-2025-2727

High

Published: 25 March 2025

Published
25 March 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0025 48.0th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse Unix shell commands and scripts for execution.

Security Summary

CVE-2025-2727 is a critical command injection vulnerability affecting H3C Magic NX30 Pro routers up to version V100R007. The issue resides in an unknown part of the /api/wizard/getNetworkStatus endpoint within the HTTP POST Request Handler component. Successful exploitation allows arbitrary command execution, as classified under CWE-74 (Improper Neutralization of Special Elements) and CWE-77 (Command Injection). The vulnerability carries a CVSS v3.1 base score of 8.0.

Exploitation requires adjacent network access (AV:A), low attack complexity (AC:L), and low privileges (PR:L), with no user interaction needed (UI:N). An attacker with local network proximity and minimal authentication can send a crafted HTTP POST request to the vulnerable endpoint, injecting and executing arbitrary operating system commands on the device. This grants high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H).

Advisories recommend upgrading the affected component to a patched version, as noted in the vulnerability description and linked H3C software download portal. Additional details are available via VulDB entries and a public GitHub disclosure containing the exploit.

The exploit has been publicly disclosed and may be actively used by attackers.

Details

CWE(s)
CWE-74CWE-77

MITRE ATT&CK Enterprise Techniques

T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Command injection in HTTP endpoint on network device enables exploitation of remote service for code execution (T1210) and direct arbitrary OS command execution via Unix shell (T1059.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References