Cyber Posture

CVE-2025-2731

High

Published: 25 March 2025

Published
25 March 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0025 48.0th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse Unix shell commands and scripts for execution.

Security Summary

CVE-2025-2731 is a critical command injection vulnerability (CVSS 8.0, CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) discovered in H3C Magic NX15, Magic NX30 Pro, Magic NX400, Magic R3010, and Magic BE18000 routers up to version V100R014. The issue resides in an unknown functionality of the /api/wizard/getDualbandSync endpoint within the HTTP POST Request Handler component and is linked to CWE-74 and CWE-77. Published on 2025-03-25, it enables manipulation via crafted POST requests.

An attacker on the adjacent local network with low privileges can exploit this vulnerability by sending a malicious HTTP POST request to the affected endpoint, requiring low complexity and no user interaction. Successful exploitation leads to arbitrary command injection, granting high-impact compromise of confidentiality, integrity, and availability on the targeted device.

Advisories recommend upgrading the affected component to a patched version as the primary mitigation. Details are available via VulDB entries and the H3C software download portal for relevant firmware updates.

The exploit has been publicly disclosed and may be actively used by attackers.

Details

CWE(s)
CWE-74CWE-77

MITRE ATT&CK Enterprise Techniques

T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

The CVE describes a command injection vulnerability in a router's HTTP API endpoint, allowing arbitrary command execution via crafted POST requests from an adjacent network. This directly maps to exploitation of remote services (T1210) and command execution via Unix shell (T1059.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References