Cyber Posture

CVE-2025-65883

HighPublic PoC

Published: 04 December 2025

Published
04 December 2025
Modified
23 December 2025
KEV Added
Patch
CVSS Score 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0008 23.8th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse Unix shell commands and scripts for execution.

Security Summary

CVE-2025-65883 affects the Genexis Platinum P4410 router running firmware version P4410-V2-1.41. The vulnerability arises from improper session invalidation after an administrator logs out, as classified under CWE-613. This issue enables a local network attacker to reuse the stale session token for remote code execution with root privileges by sending crafted requests to the router's diagnostic endpoint.

A local network attacker with no required privileges can exploit this vulnerability due to its low attack complexity and lack of need for user interaction. By leveraging the persistent session token post-logout, the attacker achieves arbitrary command execution as root on the device. The CVSS v3.1 base score of 8.4 (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) reflects high impacts on confidentiality, integrity, and availability.

Details on mitigation, including any patches or vendor advisories, can be found in the referenced write-up at https://0xw41th.medium.com/my-first-cve-cve-2025-65883-remote-code-execution-in-a-genexis-router-0c35749a99bd, published alongside the CVE on 2025-12-04.

Details

CWE(s)
CWE-613

Affected Products

genexis
platinum 4410 firmware
p4410-v2-1.41

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Vulnerability enables unauthenticated attackers to exploit the router's diagnostic endpoint (T1190, T1210) for arbitrary root command execution via Unix shell (T1059.004) by reusing stale admin session tokens.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References