CVE-2025-67113
Received Received - Intake
OS Command Injection in Sercomm SCE4255W CWMP Client Allows Root Execution

Publication date: 2026-03-19

Last updated on: 2026-03-24

Assigner: MITRE

Description
OS command injection in the CWMP client (/ftl/bin/cwmp) of Small Cell Sercomm SCE4255W (FreedomFi Englewood) firmware before DG3934v3@2308041842 allows remote attackers controlling the ACS endpoint to execute arbitrary commands as root via a crafted TR-069 Download URL that is passed unescaped into the firmware upgrade pipeline.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-19
Last Modified
2026-03-24
Generated
2026-05-07
AI Q&A
2026-03-19
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
sercomm sce4255w to dg3934v3@2308041842 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-94 The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-67113 is an OS command injection vulnerability in the CWMP client (/ftl/bin/cwmp) of the Small Cell Sercomm SCE4255W device firmware before DG3934v3@2308041842. The vulnerability occurs because the CWMP client improperly validates the Download URL parameter received from the ACS server. This URL is passed without escaping or sanitization into the firmware upgrade pipeline, allowing shell metacharacters to be executed.

An attacker controlling the ACS endpoint can send a crafted TR-069 Download URL containing shell commands. These commands are executed as root on the device, enabling full device compromise. The vulnerability arises from the CWMP client concatenating the attacker-controlled URL into shell commands without neutralizing dangerous characters, leading to arbitrary command execution.


How can this vulnerability impact me? :

This vulnerability allows a remote attacker who controls the ACS server endpoint to execute arbitrary commands as root on the affected device. This means the attacker can fully compromise the device, gaining complete control over its functions and data.

  • Full device compromise with root privileges.
  • Execution of arbitrary commands, potentially leading to unauthorized access, data theft, or disruption of service.
  • Potential to open backdoors, such as a root shell accessible remotely.
  • Undermining the security of private LTE networks relying on this device.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': "The vulnerability can be detected by monitoring for unusual or unauthorized CWMP Download commands sent to the device's ACS endpoint, especially those containing suspicious URLs with shell metacharacters. Since the exploit involves execution of arbitrary commands as root via crafted TR-069 Download URLs, network administrators should look for unexpected connections or commands targeting the CWMP client (/ftl/bin/cwmp)."}, {'type': 'paragraph', 'content': 'One practical detection method is to check for open TCP port 42588, which was used in the exploit demonstration to spawn a root shell via socat. You can use commands like:'}, {'type': 'list_item', 'content': 'netstat -tuln | grep 42588'}, {'type': 'list_item', 'content': 'ss -tuln | grep 42588'}, {'type': 'paragraph', 'content': 'Additionally, inspecting the device logs or network traffic for CWMP Download messages containing suspicious URLs with shell metacharacters (e.g., backticks) may help detect exploitation attempts.'}] [3]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include:

  • Restrict or disable remote ACS server access to the CWMP client to trusted and verified endpoints only.
  • Update the device firmware to a version later than DG3934v3@2308041842 where the vulnerability is fixed.
  • Monitor and block suspicious TR-069 Download commands containing shell metacharacters or unexpected URLs.
  • If firmware update is not immediately possible, consider isolating the device from untrusted networks to prevent malicious ACS servers from being reachable.
  • Check for and close any unauthorized open ports such as TCP 42588 that may be used by attackers to gain root shell access.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart