Cyber Posture

CVE-2025-22905

CriticalPublic PoCRCE

Published: 16 January 2025

Published
16 January 2025
Modified
09 April 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0135 80.2th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-22905 is a critical-severity Code Injection (CWE-94) vulnerability in Edimax Re11S Firmware. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 19.8% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the CVE by requiring identification, reporting, and timely patching of the command injection flaw in RE11S v1.11.

prevent

Prevents command injection by enforcing validation of the untrusted 'command' parameter at the /goform/mp endpoint.

preventdetect

Boundary protection mechanisms like web application firewalls can inspect and block malicious command injection payloads targeting the vulnerable endpoint.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Unauthenticated remote command injection via public web endpoint (/goform/mp) directly enables exploitation of public-facing application (T1190) and arbitrary command execution on likely Linux-based device (T1059.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

RE11S v1.11 was discovered to contain a command injection vulnerability via the command parameter at /goform/mp.

Deeper analysisAI

CVE-2025-22905 is a command injection vulnerability in RE11S version 1.11, exploitable via the command parameter at the /goform/mp endpoint. This issue, mapped to CWE-94, affects the RE11S software and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical due to its potential for severe impact.

Unauthenticated remote attackers with network access can exploit this vulnerability with low attack complexity and no user interaction. Successful exploitation allows arbitrary command injection, enabling high confidentiality, integrity, and availability impacts, such as full system compromise.

Mitigation guidance and additional details are available through vendor-related references, including http://re11s.com and https://www.edimax.com/edimax/global/. A proof-of-concept demonstrating the command injection is published at https://github.com/xyqer1/RE11S_1.11-mp-CommandInjection.

Details

CWE(s)

Affected Products

edimax
re11s firmware
1.11

CVEs Like This One

CVE-2025-22906Same product: Edimax Re11S
CVE-2025-22912Same product: Edimax Re11S
CVE-2025-22916Same product: Edimax Re11S
CVE-2025-22904Same product: Edimax Re11S
CVE-2025-22907Same product: Edimax Re11S
CVE-2025-22913Same product: Edimax Re11S
CVE-2025-1316Same vendor: Edimax
CVE-2025-70161Same vendor: Edimax
CVE-2024-48418Same vendor: Edimax
CVE-2026-25001Shared CWE-94

References