CVE-2025-29269
Published: 04 December 2025
Description
ALLNET ALL-RUT22GW v3.3.8 was discovered to contain an OS command injection vulnerability via the command parameter in the popen.cgi endpoint.
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates OS command injection by requiring validation and sanitization of the vulnerable 'command' parameter in the popen.cgi endpoint.
Establishes a risk-based process to identify, prioritize, and remediate the specific flaw in popen.cgi that enables arbitrary OS command execution.
Implements boundary protections such as web application firewalls to inspect and block network traffic containing command injection payloads targeting the popen.cgi endpoint.
Security SummaryAI
CVE-2025-29269 is an OS command injection vulnerability affecting ALLNET ALL-RUT22GW version 3.3.8, exploitable via the command parameter in the popen.cgi endpoint. Classified under CWE-78, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its potential for severe impacts across confidentiality, integrity, and availability.
Remote attackers with network access can exploit this vulnerability without authentication, privileges, or user interaction. By injecting malicious commands through the vulnerable parameter, they can achieve arbitrary operating system command execution on the affected device, enabling full compromise including data theft, modification, or denial of service.
Vendor advisories and further details are available at http://all-rut22gw.com and http://allnet.com, alongside analysis in a blog post on critical vulnerabilities in RUT22GW industrial LTE cellular routers at https://blog.byteray.co.uk/critical-vulnerabilities-in-rut22gw-industrial-lte-cellular-routers-f4eb8768feb7?gi=f74ff4eb9f22. The CVE entry does not specify patch availability or mitigation steps.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability is an unauthenticated OS command injection in a public-facing CGI endpoint (popen.cgi), directly enabling T1190 (Exploit Public-Facing Application) for initial access and T1059.004 (Unix Shell) for arbitrary command execution on the likely Linux-based router.