CVE-2025-50475
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-31

Last updated on: 2025-07-31

Assigner: MITRE

Description
An OS command injection vulnerability exists in Russound MBX-PRE-D67F firmware version 3.1.6, allowing unauthenticated attackers to execute arbitrary commands as root via crafted input to the hostname parameter in network configuration requests. This vulnerability stems from improper neutralization of special elements used in an OS command within the network configuration handler, enabling remote code execution with the highest privileges.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-31
Last Modified
2025-07-31
Generated
2026-05-07
AI Q&A
2025-07-31
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
russound mbx-pre-d67f 3.1.6
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an OS command injection in the Russound MBX-PRE-D67F firmware version 3.1.6. It allows unauthenticated attackers to execute arbitrary commands with root privileges by sending specially crafted input to the hostname parameter in network configuration requests. The issue arises because the firmware does not properly neutralize special characters in the hostname parameter, enabling remote code execution with the highest level of access.


How can this vulnerability impact me? :

This vulnerability can have severe impacts as it allows attackers to remotely execute any command on the affected device with root privileges without authentication. This could lead to full system compromise, unauthorized access to sensitive data, disruption of device functionality, and potentially using the device as a foothold to attack other systems in the network.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart