CVE-2025-63221
Published: 19 November 2025
Description
The Axel Technology puma devices (firmware versions 0.8.5 to 1.0.3) are vulnerable to Broken Access Control due to missing authentication on the /cgi-bin/gstFcgi.fcgi endpoint. Unauthenticated remote attackers can list user accounts, create new administrative users, delete users, and modify system…
more
settings, leading to full compromise of the device.
Mitigating Controls (NIST 800-53 r5)AI
Directly requires organizations to identify and restrict sensitive actions like user management that can be performed without authentication, preventing exploitation of the unauthenticated endpoint.
Mandates enforcement of approved authorizations for access to system resources, ensuring the vulnerable endpoint requires authentication for administrative functions.
Requires proper management of accounts including creation, modification, and deletion, mitigating unauthorized user account operations via the exposed endpoint.
Security SummaryAI
CVE-2025-63221 is a Broken Access Control vulnerability (CWE-284) affecting Axel Technology puma devices running firmware versions 0.8.5 through 1.0.3. The issue stems from missing authentication on the /cgi-bin/gstFcgi.fcgi endpoint, which exposes sensitive administrative functions without requiring credentials. It has a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N), indicating critical severity due to its network accessibility and lack of prerequisites.
Unauthenticated remote attackers can exploit this vulnerability over the network with low complexity. Successful exploitation allows attackers to list existing user accounts, create new administrative users, delete users, and modify system settings, ultimately resulting in full compromise of the affected device.
Mitigation details are not specified in the CVE description, but security practitioners should consult the provided references, including a GitHub vulnerability research repository at https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-63221_Axel%20Technology%20puma%20-%20Broken%20Access%20Control and the vendor's website at https://www.axeltechnology.com/ for any advisories, patches, or workarounds.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vulnerability enables unauthenticated exploitation of public-facing web endpoint (T1190), account enumeration (T1087.001), creation of admin accounts (T1136.001), account manipulation/deletion (T1098, T1531), and system settings modification leading to full compromise.