SQL injection vulnerability in DIAL's CentrosNet v2.64. Allows an attacker to retrieve, create, update, and delete databases by sending POST and GET requests with the 'ultralogin' parameter in '/centrosnet/ultralogin.php'.
Advisories

No advisories yet.

Fixes

Solution

The vulnerability has been fixed by the DIAL team in version 2.65.


Workaround

No workaround given by the vendor.

History

Fri, 07 Nov 2025 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 07 Nov 2025 09:30:00 +0000

Type Values Removed Values Added
Description SQL injection vulnerability in DIAL's CentrosNet v2.64. Allows an attacker to retrieve, create, update, and delete databases by sending POST and GET requests with the 'ultralogin' parameter in '/centrosnet/ultralogin.php'.
Title SQL injection in DIAL's CentrosNet
Weaknesses CWE-89
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published:

Updated: 2025-11-07T12:09:38.397Z

Reserved: 2025-09-23T10:22:37.437Z

Link: CVE-2025-10870

cve-icon Vulnrichment

Updated: 2025-11-07T12:09:34.757Z

cve-icon NVD

Status : Received

Published: 2025-11-07T10:15:38.060

Modified: 2025-11-07T10:15:38.060

Link: CVE-2025-10870

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.