Cyber Posture

CVE-2025-66953

HighPublic PoC

Published: 17 December 2025

Published
17 December 2025
Modified
02 January 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0015 35.6th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

CSRF vulnerability in narda miteq Uplink Power Contril Unit UPC2 v.1.17 allows a remote attacker to execute arbitrary code via the Web-based management interface and specifically the /system_setup.htm, /set_clock.htm, /receiver_setup.htm, /cal.htm?..., and /channel_setup.htm endpoints

Mitigating Controls (NIST 800-53 r5)AI

prevent

SC-23 enforces session authenticity mechanisms such as anti-CSRF tokens or SameSite cookies, directly preventing forged requests to the vulnerable UPC2 web endpoints.

prevent

SI-10 requires validation of inputs to the affected endpoints (/system_setup.htm, /set_clock.htm, etc.), rejecting forged CSRF requests lacking valid tokens or origin checks.

preventrecover

SI-2 mandates identification, reporting, and correction of the specific CSRF flaw in UPC2 v1.17, including patching or implementing mitigations to prevent arbitrary code execution.

Security SummaryAI

CVE-2025-66953 is a Cross-Site Request Forgery (CSRF) vulnerability, classified under CWE-352, affecting the narda miteq Uplink Power Control Unit (UPC2) version 1.17. The flaw exists in the Web-based management interface, specifically at the /system_setup.htm, /set_clock.htm, /receiver_setup.htm, /cal.htm?..., and /channel_setup.htm endpoints. It has a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), indicating high severity due to network accessibility, low attack complexity, no required privileges, user interaction, and significant impacts on confidentiality, integrity, and availability.

A remote attacker can exploit this CSRF vulnerability by tricking an authenticated user into visiting a malicious webpage that submits forged requests to the affected endpoints. No privileges are needed from the attacker (PR:N), but the attack requires user interaction, such as clicking a link. Successful exploitation enables arbitrary code execution on the UPC2 device.

References include a GitHub repository from vulnerability researcher shiky8 containing details and likely proof-of-concept code for CVE-2025-66953, as well as the vendor website at nardamiteq.com. No specific patches or mitigation guidance from official advisories is detailed in the provided information.

Details

CWE(s)

Affected Products

nardamiteq
upc2 firmware
1.17

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The CSRF vulnerability in the public-facing web-based management interface of the UPC2 device directly enables remote exploitation of a public-facing application (T1190) to achieve arbitrary code execution without privileges.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References