No analysis available yet.
Vendor Solution
The vulnerability has been fixed by the DIAL team in version 2.65.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 10 Nov 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dial
Dial centrosnet |
|
| Vendors & Products |
Dial
Dial centrosnet |
Fri, 07 Nov 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 07 Nov 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SQL injection vulnerability in DIAL's CentrosNet v2.64. Allows an attacker to retrieve, create, update, and delete databases by sending POST and GET requests with the 'ultralogin' parameter in '/centrosnet/ultralogin.php'. | |
| Title | SQL injection in DIAL's CentrosNet | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2025-11-07T12:09:38.397Z
Reserved: 2025-09-23T10:22:37.437Z
Link: CVE-2025-10870
Updated: 2025-11-07T12:09:34.757Z
Status : Deferred
Published: 2025-11-07T10:15:38.060
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-10870
No data.
OpenCVE Enrichment
Updated: 2025-11-10T09:34:49Z