The /goform/formJsonAjaxReq POST endpoint of Shenzhen Tuoshi NR500-EA RG500UEAABxCOMSLICv3.4.2731.16.43 devices mishandles the set_timesetting action with the ntpserver0 parameter, which is used in a system command. By setting a username=admin cookie (bypassing normal session checks), an unauthenticated attacker can use that parameter to execute arbitrary OS commands.
Metrics
Affected Vendors & Products
References
History
Thu, 14 Aug 2025 06:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-78 | |
Metrics |
cvssV3_1
|
Wed, 13 Aug 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The /goform/formJsonAjaxReq POST endpoint of Shenzhen Tuoshi NR500-EA RG500UEAABxCOMSLICv3.4.2731.16.43 devices mishandles the set_timesetting action with the ntpserver0 parameter, which is used in a system command. By setting a username=admin cookie (bypassing normal session checks), an unauthenticated attacker can use that parameter to execute arbitrary OS commands. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-08-13T00:00:00.000Z
Updated: 2025-08-13T20:30:40.433Z
Reserved: 2025-04-21T00:00:00.000Z
Link: CVE-2025-43989

Updated: 2025-08-13T20:30:32.199Z

Status : Awaiting Analysis
Published: 2025-08-13T19:15:28.633
Modified: 2025-08-14T13:11:53.633
Link: CVE-2025-43989

No data.