{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-6559","assignerOrgId":"cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e","state":"PUBLISHED","assignerShortName":"twcert","dateReserved":"2025-06-24T01:24:44.230Z","datePublished":"2025-06-24T01:47:25.776Z","dateUpdated":"2025-06-24T15:32:51.258Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"BR071n","vendor":"Sapido","versions":[{"status":"affected","version":"0"}]},{"defaultStatus":"unaffected","product":"BR261c","vendor":"Sapido","versions":[{"status":"affected","version":"0"}]},{"defaultStatus":"unaffected","product":"BR270n","vendor":"Sapido","versions":[{"status":"affected","version":"0"}]},{"defaultStatus":"unaffected","product":"BR476n","vendor":"Sapido","versions":[{"status":"affected","version":"0"}]},{"defaultStatus":"unaffected","product":"BRC70n","vendor":"Sapido","versions":[{"status":"affected","version":"0"}]},{"defaultStatus":"unaffected","product":"BRC70x","vendor":"Sapido","versions":[{"status":"affected","version":"0"}]},{"defaultStatus":"unaffected","product":"BRC76n","vendor":"Sapido","versions":[{"status":"affected","version":"0"}]},{"defaultStatus":"unaffected","product":"BRD70n","vendor":"Sapido","versions":[{"status":"affected","version":"0"}]},{"defaultStatus":"unaffected","product":"BRE70n","vendor":"Sapido","versions":[{"status":"affected","version":"0"}]},{"defaultStatus":"unaffected","product":"BRE71n","vendor":"Sapido","versions":[{"status":"affected","version":"0"}]},{"defaultStatus":"unaffected","product":"BRF61c","vendor":"Sapido","versions":[{"status":"affected","version":"0"}]},{"defaultStatus":"unaffected","product":"BRF71n","vendor":"Sapido","versions":[{"status":"affected","version":"0"}]}],"datePublic":"2025-06-24T01:37:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Multiple wireless router models from Sapido have an OS Command Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary OS commands and execute them on the server.&nbsp;The affected models are out of support; replacing the device is recommended."}],"value":"Multiple wireless router models from Sapido have an OS Command Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary OS commands and execute them on the server. The affected models are out of support; replacing the device is recommended."}],"impacts":[{"capecId":"CAPEC-88","descriptions":[{"lang":"en","value":"CAPEC-88 OS Command Injection"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":9.3,"baseSeverity":"CRITICAL","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]},{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-78","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e","shortName":"twcert","dateUpdated":"2025-06-24T01:47:25.776Z"},"references":[{"tags":["third-party-advisory"],"url":"https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html"},{"tags":["third-party-advisory"],"url":"https://www.twcert.org.tw/en/cp-139-10195-69da1-2.html"}],"source":{"advisory":"TVN-202506006","discovery":"EXTERNAL"},"tags":["unsupported-when-assigned"],"title":"Sapido Wireless Router - OS Command Injection","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-06-24T15:27:36.396380Z","id":"CVE-2025-6559","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-24T15:32:51.258Z"}}]}}