The /goform/formJsonAjaxReq POST endpoint of Shenzhen Tuoshi NR500-EA RG500UEAABxCOMSLICv3.4.2731.16.43 devices mishandles the set_timesetting action with the ntpserver0 parameter, which is used in a system command. By setting a username=admin cookie (bypassing normal session checks), an unauthenticated attacker can use that parameter to execute arbitrary OS commands.
History

Thu, 14 Aug 2025 06:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-78
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 13 Aug 2025 19:15:00 +0000

Type Values Removed Values Added
Description The /goform/formJsonAjaxReq POST endpoint of Shenzhen Tuoshi NR500-EA RG500UEAABxCOMSLICv3.4.2731.16.43 devices mishandles the set_timesetting action with the ntpserver0 parameter, which is used in a system command. By setting a username=admin cookie (bypassing normal session checks), an unauthenticated attacker can use that parameter to execute arbitrary OS commands.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-08-13T00:00:00.000Z

Updated: 2025-08-13T20:30:40.433Z

Reserved: 2025-04-21T00:00:00.000Z

Link: CVE-2025-43989

cve-icon Vulnrichment

Updated: 2025-08-13T20:30:32.199Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-13T19:15:28.633

Modified: 2025-08-14T13:11:53.633

Link: CVE-2025-43989

cve-icon Redhat

No data.