{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-13797","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-11-30T13:58:22.378Z","datePublished":"2025-12-01T00:02:06.184Z","dateUpdated":"2025-12-01T14:54:25.732Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-12-01T00:02:06.184Z"},"title":"ADSLR B-QE2W401 send_order.cgi parameterdel_swifimac command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"Command Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-74","lang":"en","description":"Injection"}]}],"affected":[{"vendor":"ADSLR","product":"B-QE2W401","versions":[{"version":"250814-r037c","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was detected in ADSLR B-QE2W401 250814-r037c. Affected by this issue is the function parameterdel_swifimac of the file /send_order.cgi. Performing manipulation of the argument del_swifimac results in command injection. The attack is possible to be carried out remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-11-30T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-11-30T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-11-30T15:03:43.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"2er00ne (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.333808","name":"VDB-333808 | ADSLR B-QE2W401 send_order.cgi parameterdel_swifimac command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.333808","name":"VDB-333808 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.691838","name":"Submit #691838 | Adslr B-QE2W401 250814-r037c Remote code execution","tags":["third-party-advisory"]},{"url":"https://www.notion.so/2a60c75766a88027a6aec07b378332a8","tags":["exploit"]}]},"adp":[{"references":[{"url":"https://www.notion.so/report-7-2a60c75766a88027a6aec07b378332a8","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-01T14:54:20.851306Z","id":"CVE-2025-13797","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-01T14:54:25.732Z"}}]}}