CVE-2025-22905
Published: 16 January 2025
Summary
CVE-2025-22905 is a critical-severity Code Injection (CWE-94) vulnerability in Edimax Re11S Firmware. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 19.8% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the CVE by requiring identification, reporting, and timely patching of the command injection flaw in RE11S v1.11.
Prevents command injection by enforcing validation of the untrusted 'command' parameter at the /goform/mp endpoint.
Boundary protection mechanisms like web application firewalls can inspect and block malicious command injection payloads targeting the vulnerable endpoint.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated remote command injection via public web endpoint (/goform/mp) directly enables exploitation of public-facing application (T1190) and arbitrary command execution on likely Linux-based device (T1059.004).
NVD Description
RE11S v1.11 was discovered to contain a command injection vulnerability via the command parameter at /goform/mp.
Deeper analysisAI
CVE-2025-22905 is a command injection vulnerability in RE11S version 1.11, exploitable via the command parameter at the /goform/mp endpoint. This issue, mapped to CWE-94, affects the RE11S software and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical due to its potential for severe impact.
Unauthenticated remote attackers with network access can exploit this vulnerability with low attack complexity and no user interaction. Successful exploitation allows arbitrary command injection, enabling high confidentiality, integrity, and availability impacts, such as full system compromise.
Mitigation guidance and additional details are available through vendor-related references, including http://re11s.com and https://www.edimax.com/edimax/global/. A proof-of-concept demonstrating the command injection is published at https://github.com/xyqer1/RE11S_1.11-mp-CommandInjection.
Details
- CWE(s)