CVE-2025-22939
Published: 31 March 2025
Summary
CVE-2025-22939 is a critical-severity Command Injection (CWE-77) vulnerability in Adtran 411 Firmware. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 9.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 CM-7 (Least Functionality) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Timely remediation of the command injection flaw via firmware patching directly prevents exploitation of CVE-2025-22939 in the Adtran 411 ONT telnet service.
Validating all inputs to the telnet service blocks specially crafted payloads that enable command injection and root escalation.
Prohibiting or restricting the telnet service enforces least functionality, eliminating network exposure to this unauthenticated remote vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Command injection in exposed telnet service directly enables remote unauthenticated arbitrary command execution on Unix-based device and root privilege escalation.
NVD Description
A command injection vulnerability in the telnet service of Adtran 411 ONT L80.00.0011.M2 allows attackers to escalate privileges to root and execute arbitrary commands.
Deeper analysisAI
CVE-2025-22939 is a command injection vulnerability (CWE-77) in the telnet service of the Adtran 411 ONT running firmware version L80.00.0011.M2. This flaw enables attackers to escalate privileges to root and execute arbitrary commands on the affected device. The vulnerability received a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its network accessibility, low attack complexity, and lack of required privileges or user interaction.
Remote attackers can exploit this vulnerability over the network by sending specially crafted input to the telnet service, achieving unauthenticated root privilege escalation and full arbitrary command execution. Successful exploitation grants complete control over the ONT device, potentially allowing attackers to manipulate network traffic, install persistent malware, or pivot to other systems in the ISP environment.
Mitigation details and further technical analysis are available in advisories referenced at https://drive.google.com/file/d/1levaZk5aC6g6a2zPW8xlOIVAu9MFYvAz/view, https://lanrat.com/posts/adtran-isp-hacking/, and https://www.youtube.com/watch?v=Aic-QaSqjxc. Security practitioners should review these sources for patch availability or workaround guidance specific to Adtran 411 ONT deployments.
Details
- CWE(s)