Jointelli 5G CPE 21H01 firmware JY_21H01_A3_v1.36 devices allow (blind) OS command injection. Multiple endpoints are vulnerable, including /ubus/?flag=set_WPS_pin and /ubus/?flag=netAppStar1 and /ubus/?flag=set_wifi_cfgs. This allows an authenticated attacker to execute arbitrary OS commands with root privileges via crafted inputs to the SSID, WPS, Traceroute, and Ping fields.
Metrics
Affected Vendors & Products
References
History
Tue, 05 Aug 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-78 | |
Metrics |
cvssV3_1
|
Tue, 05 Aug 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Jointelli 5G CPE 21H01 firmware JY_21H01_A3_v1.36 devices allow (blind) OS command injection. Multiple endpoints are vulnerable, including /ubus/?flag=set_WPS_pin and /ubus/?flag=netAppStar1 and /ubus/?flag=set_wifi_cfgs. This allows an authenticated attacker to execute arbitrary OS commands with root privileges via crafted inputs to the SSID, WPS, Traceroute, and Ping fields. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-08-05T00:00:00.000Z
Updated: 2025-08-05T19:59:14.145Z
Reserved: 2025-04-21T00:00:00.000Z
Link: CVE-2025-43978

Updated: 2025-08-05T19:59:09.235Z

Status : Awaiting Analysis
Published: 2025-08-05T17:15:27.183
Modified: 2025-08-05T21:06:25.813
Link: CVE-2025-43978

No data.