CVE-2025-24861
Published: 13 February 2025
Summary
CVE-2025-24861 is a high-severity Command Injection (CWE-77) vulnerability in Outbackpower Mojave Inverter Oghi8048A Firmware. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 48.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents command injection by validating and sanitizing specially-crafted POST request inputs to block malicious command payloads.
Addresses the root cause by identifying, reporting, and correcting the specific command injection flaw described in the CVE.
Boundary protection via proxies or web application firewalls inspects and blocks anomalous POST requests indicative of command injection attempts.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated command injection via POST in a public-facing application directly enables T1190 (Exploit Public-Facing Application) for initial access and facilitates T1059 (Command and Scripting Interpreter) for arbitrary command execution leading to data disclosure.
NVD Description
An attacker may inject commands via specially-crafted post requests.
Deeper analysisAI
CVE-2025-24861, published on 2025-02-13, is a command injection vulnerability (CWE-77) that enables an attacker to inject commands via specially-crafted POST requests. It carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high confidentiality impact with no integrity or availability effects. The vulnerability affects components referenced in CISA ICS advisory ICSA-25-044-17 and the Outback Power website.
Unauthenticated attackers with network access can exploit this vulnerability with low complexity and no user interaction required. Successful exploitation allows remote command injection, potentially leading to unauthorized disclosure of sensitive information on the affected system.
For mitigation details, refer to the CISA advisory at https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-17 and Outback Power contact page at https://old.outbackpower.com/about-outback/contact/contact-us.
Details
- CWE(s)