CVE-2025-66953
Published: 17 December 2025
Description
CSRF vulnerability in narda miteq Uplink Power Contril Unit UPC2 v.1.17 allows a remote attacker to execute arbitrary code via the Web-based management interface and specifically the /system_setup.htm, /set_clock.htm, /receiver_setup.htm, /cal.htm?..., and /channel_setup.htm endpoints
Mitigating Controls (NIST 800-53 r5)AI
SC-23 enforces session authenticity mechanisms such as anti-CSRF tokens or SameSite cookies, directly preventing forged requests to the vulnerable UPC2 web endpoints.
SI-10 requires validation of inputs to the affected endpoints (/system_setup.htm, /set_clock.htm, etc.), rejecting forged CSRF requests lacking valid tokens or origin checks.
SI-2 mandates identification, reporting, and correction of the specific CSRF flaw in UPC2 v1.17, including patching or implementing mitigations to prevent arbitrary code execution.
Security SummaryAI
CVE-2025-66953 is a Cross-Site Request Forgery (CSRF) vulnerability, classified under CWE-352, affecting the narda miteq Uplink Power Control Unit (UPC2) version 1.17. The flaw exists in the Web-based management interface, specifically at the /system_setup.htm, /set_clock.htm, /receiver_setup.htm, /cal.htm?..., and /channel_setup.htm endpoints. It has a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), indicating high severity due to network accessibility, low attack complexity, no required privileges, user interaction, and significant impacts on confidentiality, integrity, and availability.
A remote attacker can exploit this CSRF vulnerability by tricking an authenticated user into visiting a malicious webpage that submits forged requests to the affected endpoints. No privileges are needed from the attacker (PR:N), but the attack requires user interaction, such as clicking a link. Successful exploitation enables arbitrary code execution on the UPC2 device.
References include a GitHub repository from vulnerability researcher shiky8 containing details and likely proof-of-concept code for CVE-2025-66953, as well as the vendor website at nardamiteq.com. No specific patches or mitigation guidance from official advisories is detailed in the provided information.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The CSRF vulnerability in the public-facing web-based management interface of the UPC2 device directly enables remote exploitation of a public-facing application (T1190) to achieve arbitrary code execution without privileges.