Hitron CGNF-TWN 3.1.1.43-TWN-pre3 contains a command injection vulnerability in the telnet service. The issue arises due to improper input validation within the telnet command handling mechanism. An attacker can exploit this vulnerability by injecting arbitrary commands through the telnet interface when prompted for inputs or commands. Successful exploitation could lead to remote code execution (RCE) under the privileges of the telnet user, potentially allowing unauthorized access to system settings and sensitive information.
History

Tue, 26 Aug 2025 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-77
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 25 Aug 2025 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Hitron
Hitron cgnf-twn
Vendors & Products Hitron
Hitron cgnf-twn

Mon, 25 Aug 2025 14:45:00 +0000

Type Values Removed Values Added
Description Hitron CGNF-TWN 3.1.1.43-TWN-pre3 contains a command injection vulnerability in the telnet service. The issue arises due to improper input validation within the telnet command handling mechanism. An attacker can exploit this vulnerability by injecting arbitrary commands through the telnet interface when prompted for inputs or commands. Successful exploitation could lead to remote code execution (RCE) under the privileges of the telnet user, potentially allowing unauthorized access to system settings and sensitive information.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-08-26T15:52:28.329Z

Reserved: 2025-04-22T00:00:00.000Z

Link: CVE-2025-44179

cve-icon Vulnrichment

Updated: 2025-08-26T15:52:23.619Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-25T15:15:39.443

Modified: 2025-08-26T16:15:35.903

Link: CVE-2025-44179

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-08-25T22:08:09Z