CVE-2025-24285
Published: 21 August 2025
Summary
CVE-2025-24285 is a critical-severity Command Injection (CWE-77) vulnerability in Ui (inferred from references). Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 36.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses improper input validation vulnerabilities by requiring validation of all inputs to prevent command injection attacks like CWE-77.
Mandates timely flaw remediation, including patching the UniFi Connect EV Station Lite to version 1.5.2 or later to eliminate the command injection vulnerability.
Enforces boundary protection at network interfaces to monitor and control communications, reducing exposure of the unauthenticated vulnerable service to remote attackers.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated command injection (CWE-77) on a network-exposed device directly enables T1190 for initial access and arbitrary command execution.
NVD Description
Multiple Improper Input Validation vulnerabilities in UniFi Connect EV Station Lite may allow a Command Injection by a malicious actor with network access to the UniFi Connect EV Station Lite. Affected Products: UniFi Connect EV Station Lite (Version 1.5.1 and…
more
earlier) Mitigation: Update UniFi Connect EV Station Lite to Version 1.5.2 or later
Deeper analysisAI
CVE-2025-24285 consists of multiple improper input validation vulnerabilities in the UniFi Connect EV Station Lite, affecting versions 1.5.1 and earlier. These flaws enable command injection, as classified under CWE-77, and were published on 2025-08-21 with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
A malicious actor with network access to the UniFi Connect EV Station Lite can exploit these vulnerabilities remotely without authentication, privileges, or user interaction. Successful exploitation allows arbitrary command execution, resulting in high-impact compromise of confidentiality, integrity, and availability on the affected device.
Ubiquiti's Security Advisory Bulletin 052 recommends updating the UniFi Connect EV Station Lite to version 1.5.2 or later as the primary mitigation. Further details are available at https://community.ui.com/releases/Security-Advisory-Bulletin-052-052/ac1251ee-5bb5-4cdf-8a71-68acd1775bb6.
Details
- CWE(s)