Description
Vulnerable endpoints accept user-controlled input through a URL in JSON format which enables command execution. The commands allowed to execute can open executables. However, the commands cannot pass parameters or arguments. 
To successfully execute this attack, the attacker needs to be on the same network.
Published: 2026-03-24
Score: 2.1 Low
EPSS: < 1% Very Low
KEV: No
Impact: Command Execution
Action: Assess Impact
AI Analysis

Impact

Vulnerable endpoints in the Simplicity Installer accept JSON data that contains a URL, allowing the payload to be interpreted and executed as a command. The commands that can run are limited to opening executables; parameters or arguments cannot be supplied. This flaw therefore permits an attacker to launch predefined executable actions from within the installer environment, potentially compromising system integrity if the attacker can choose arbitrary executables. The vulnerability is exploitable only when the attacker can reach the target through the network that hosts the installer service, which narrows the threat to local‑network adversaries.

Affected Systems

The weakness affects Silicon Labs’ Simplicity Installer tool that ships with Simplicity Studio version 6 and earlier version 5. No specific software revisions are listed, so all builds that include the vulnerable installer component are potentially impacted.

Risk and Exploitability

The CVSS score of 2.1 indicates that the flaw is considered low severity. While no EPSS value is available and the vulnerability is not cataloged in the CISA KEV list, the exploit is straightforward: an attacker on the same network can send a crafted JSON request to the exposed endpoint, triggering execution of a limited set of commands. Because the attack requires local network proximity and offers no parameter control, the overall risk to remote adversaries is minimal, but local attackers could use the flaw to run executables that may aid further compromise within the network.

Generated by OpenCVE AI on March 24, 2026 at 18:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check for and install any updates to Simplicity Studio or the Installer component that remove the vulnerable JSON endpoint.
  • Restrict network access to the installer’s HTTP service to trusted hosts only, using firewall rules or network segmentation.
  • If possible, disable or block the JSON URL endpoint to eliminate the attack surface while a patch is pending.
  • Monitor network traffic for unusual JSON requests targeting the installer service and investigate any anomalies.

Generated by OpenCVE AI on March 24, 2026 at 18:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Silabs
Silabs simplicity Installer Tool For Simplicity Studio V6
Silabs simplicity Studio V5
Vendors & Products Silabs
Silabs simplicity Installer Tool For Simplicity Studio V6
Silabs simplicity Studio V5

Tue, 24 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Mar 2026 17:00:00 +0000

Type Values Removed Values Added
Description Vulnerable endpoints accept user-controlled input through a URL in JSON format which enables command execution. The commands allowed to execute can open executables. However, the commands cannot pass parameters or arguments.  To successfully execute this attack, the attacker needs to be on the same network.
Title Command Execution vulnerability in Simplicity Installer
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 2.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Silabs Simplicity Installer Tool For Simplicity Studio V6 Simplicity Studio V5
cve-icon MITRE

Status: PUBLISHED

Assigner: Silabs

Published:

Updated: 2026-03-24T17:43:07.517Z

Reserved: 2025-10-09T16:26:44.833Z

Link: CVE-2025-11571

cve-icon Vulnrichment

Updated: 2026-03-24T17:42:59.016Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-24T17:16:25.863

Modified: 2026-03-25T15:41:58.280

Link: CVE-2025-11571

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T20:49:47Z

Weaknesses