Vulnerable endpoints accept user-controlled input through a URL in JSON format which enables command execution. The commands allowed to execute can open executables. However, the commands cannot pass parameters or arguments.
To successfully execute this attack, the attacker needs to be on the same network.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://community.silabs.com/068Vm00000htltZ |
|
History
Wed, 25 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Silabs
Silabs simplicity Installer Tool For Simplicity Studio V6 Silabs simplicity Studio V5 |
|
| Vendors & Products |
Silabs
Silabs simplicity Installer Tool For Simplicity Studio V6 Silabs simplicity Studio V5 |
Tue, 24 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 24 Mar 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Vulnerable endpoints accept user-controlled input through a URL in JSON format which enables command execution. The commands allowed to execute can open executables. However, the commands cannot pass parameters or arguments. To successfully execute this attack, the attacker needs to be on the same network. | |
| Title | Command Execution vulnerability in Simplicity Installer | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Silabs
Published:
Updated: 2026-03-24T17:43:07.517Z
Reserved: 2025-10-09T16:26:44.833Z
Link: CVE-2025-11571
Updated: 2026-03-24T17:42:59.016Z
Status : Awaiting Analysis
Published: 2026-03-24T17:16:25.863
Modified: 2026-03-25T15:41:58.280
Link: CVE-2025-11571
No data.
OpenCVE Enrichment
Updated: 2026-03-25T20:49:47Z