CVE-2025-10095
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-09

Last updated on: 2025-09-10

Assigner: CERT.PL

Description
A SQL injection vulnerability has been identified in the SMPP server component of the SMSEagle firmware, specifically affecting the handling of certain parameters within the server's database interactions. The vulnerability is isolated to the SMPP server, which operates with its own dedicated database, separate from the main software's database. This isolation limits the scope of the vulnerability to the SMPP server's operations. The vulnerability arises from improper sanitization of user input in the SMPP server's scripts. This issue has been fixed in version 6.11.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-09
Last Modified
2025-09-10
Generated
2026-05-07
AI Q&A
2025-09-09
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
smseagle smseagle_firmware <6.11
smseagle smpp_server *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-89 The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a SQL injection issue in the SMPP server component of SMSEagle firmware versions before 6.11. It occurs because the SMPP server does not properly sanitize user input parameters when interacting with its dedicated database. This allows an attacker to inject malicious SQL commands into the database queries, potentially manipulating or accessing data within the SMPP server's database. [1]


How can this vulnerability impact me? :

The vulnerability can allow an attacker to perform SQL injection attacks on the SMPP server's dedicated database, potentially leading to unauthorized access or manipulation of data related to SMPP server operations. However, since the SMPP server uses a separate database from the main software, the impact is limited to SMPP server functions. The security impact is rated Medium with low confidentiality impact and no integrity or availability impact. [1]


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, update all SMSEagle devices to software version 6.11 or later, as the issue is fixed in that version. Updates can be performed via the web GUI or by contacting SMSEagle support for offline update packages. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart