Cyber Posture

CVE-2025-20620

High

Published: 14 January 2025

Published
14 January 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0010 26.5th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-20620 is a high-severity SQL Injection (CWE-89) vulnerability in Jvn (inferred from references). Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 26.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates SQL injection by requiring validation of all inputs to the web management page, preventing malicious SQL payloads from extracting credentials.

prevent

Ensures timely flaw remediation through firmware updates specifically recommended by the vendor to fix the SQL injection vulnerability.

detect

Enables detection of the SQL injection vulnerability via regular vulnerability scanning of the affected STEALTHONE devices.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1212 Exploitation for Credential Access Credential Access
Adversaries may exploit software vulnerabilities in an attempt to collect credentials.
Why these techniques?

SQL injection in public web management interface directly enables remote unauthenticated exploitation of a public-facing app (T1190) and credential extraction (T1212).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

SQL Injection vulnerability exists in STEALTHONE D220/D340 provided by Y'S corporation. An attacker who can access the affected product may obtain the administrative password of the web management page.

Deeper analysisAI

CVE-2025-20620 is a SQL injection vulnerability (CWE-89) present in the STEALTHONE D220 and D340 devices manufactured by Y'S Corporation. The issue affects the web management page of these products, allowing attackers to extract sensitive credentials.

With a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), the vulnerability enables remote exploitation over the network with low attack complexity, no required privileges, and no user interaction. An unauthenticated attacker who can access the affected device can leverage the SQL injection to obtain the administrative password for the web management page, potentially leading to full administrative control.

Advisories from JVN (https://jvn.jp/en/vu/JVNVU99653331/) and the vendor (https://stealthone.net/product_info/d220-d340%e3%80%8cv6-03-03%e3%80%8d%e5%8f%8a%e3%81%b3d440%e3%80%8cv7-00-11%e3%80%8d%e3%83%95%e3%82%a1%e3%83%bc%e3%83%a0%e3%82%a6%e3%82%a7%e3%82%a2%e3%82%92%e3%83%aa%e3%83%aa%e3%83%bc%e3%82%b9%e8%87%b4/) recommend applying firmware updates, including version 6.03.03 for D220/D340 and version 7.00.11 for related D440 models, to mitigate the vulnerability.

Details

CWE(s)

Affected Products

Jvn
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-25773Shared CWE-89
CVE-2026-32714Shared CWE-89
CVE-2019-25539Shared CWE-89
CVE-2015-20121Shared CWE-89
CVE-2026-3180Shared CWE-89
CVE-2025-1872Shared CWE-89
CVE-2026-32458Shared CWE-89
CVE-2026-24494Shared CWE-89
CVE-2025-26875Shared CWE-89
CVE-2026-26263Shared CWE-89

References