Metrics
Affected Vendors & Products
Solution
Avoid using external processes: Whenever possible, use library calls instead of invoking external processes to recreate desired functionality. A vendor security patch available. Upgrade to releaseĀ fast-sb-update-2.63.0.4.tar https://software.fast-lta.com/fast-sb-update-2.63.0.4.tar
Workaround
No workaround given by the vendor.
Link | Providers |
---|---|
https://www.fast-lta.de/de/fast/silent-bricks-software-2-63 |
![]() ![]() |
Mon, 31 Mar 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 31 Mar 2025 08:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A critical OS Command Injection vulnerability has been identified in the FAST LTA Silent Brick WebUI, allowing remote attackers to execute arbitrary operating system commands via specially crafted input. This vulnerability arises due to improper handling of untrusted input, which is passed directly to system-level commands without adequate sanitization or validation. Successful exploitation could allow attackers to execute arbitrary commands on the affected system, potentially resulting in unauthorized access, data leakage, or full system compromise. Affected WebUI parameters are "hd" and "pi". | |
Title | OS Command Injection Vulnerability in FAST LTA Silent Brick WebUI | |
Weaknesses | CWE-78 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2025-03-31T16:26:54.053Z
Reserved: 2025-03-06T18:18:48.091Z
Link: CVE-2025-2071

Updated: 2025-03-31T16:26:43.125Z

Status : Awaiting Analysis
Published: 2025-03-31T09:15:14.807
Modified: 2025-04-01T20:26:30.593
Link: CVE-2025-2071

No data.

No data.