CVE-2025-53913
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-09

Last updated on: 2025-09-12

Assigner: Fluid Attacks

Description
Excessive Privileges vulnerability in Calix GigaCenter ONT (Quantenna SoC modules) allows Privilege Abuse.This issue affects GigaCenter ONT: 844E, 844G, 844GE, 854GE, 812G, 813G, 818G.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-09
Last Modified
2025-09-12
Generated
2026-05-07
AI Q&A
2025-09-09
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 7 associated CPEs
Vendor Product Version / Range
calix gigacenter_ont 844e
calix gigacenter_ont 812g
calix gigacenter_ont 844g
calix gigacenter_ont 818g
calix gigacenter_ont 844ge
calix gigacenter_ont 854ge
calix gigacenter_ont 813g
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-269 The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-53913 is an excessive privileges vulnerability in Calix GigaCenter ONT devices using Quantenna SoC modules. It allows an attacker with physical access to gain unauthenticated root access via the UART debugging interface connected to the Quantenna SoC. The UART console does not require credentials, so by physically disassembling the device and connecting to the UART interface, an attacker can obtain full root shell access without authentication. [1]


How can this vulnerability impact me? :

An attacker exploiting this vulnerability can gain full root control of the affected device. This allows them to view sensitive information such as user accounts, configuration files, firmware, and web application code. They can also create backdoors, modify or enable system services, and make persistent firmware changes, potentially compromising the security and integrity of the device and network. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability cannot be detected remotely on the network as it requires physical access to the device's UART debugging interface. Detection involves physically disassembling the router to locate the UART interfaces on the PCB, specifically the Quantenna SoC UART interface. Connecting via a USB-to-UART adapter at 115200 baud rate to this interface grants root shell access without authentication. There are no specific network commands to detect this vulnerability remotely. [1]


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, apply the R12.2.13.4 patch provided by Calix. This patch is only available to authorized users, so end users should contact their broadband service providers to ensure the update is applied. Since the vulnerability requires physical access, restricting physical access to the device and securing the device location can also help reduce risk. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart