CVE-2025-9584
BaseFortify
Publication date: 2025-08-28
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| comfast | cf-n1_firmware | 2.6.0 |
| comfast | cf-n1 | 2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-74 | The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component. |
| CWE-77 | The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-9584 is a command injection vulnerability in Comfast CF-N1 version 2.6.0, specifically in the function update_interface_png within the /usr/bin/webmgnt file. It occurs because the argument interface/display_name is improperly handled, allowing an attacker to inject and execute arbitrary commands remotely. This means an attacker can run malicious commands on the affected system without authorization. [1]
How can this vulnerability impact me? :
This vulnerability can impact you by compromising the confidentiality, integrity, and availability of the affected system. An attacker can remotely execute arbitrary commands, potentially leading to unauthorized access, data manipulation, or disruption of services. Since the exploit is publicly available and easy to execute, the risk of exploitation is significant. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
Detection can involve monitoring for unusual or unauthorized use of the /usr/bin/webmgnt binary, especially calls to the update_interface_png function with suspicious interface/display_name arguments. Since the vulnerability involves command injection via this argument, inspecting logs for unexpected command execution or network traffic targeting this function may help. However, no specific detection commands or signatures are provided in the available resources. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include replacing the affected Comfast CF-N1 version 2.6.0 product with an alternative, as no known countermeasures or mitigations have been identified. Restricting network access to the vulnerable service and monitoring for exploitation attempts are also advisable until a fix or patch is available. [1]