Cyber Posture

CVE-2025-24861

HighRCE

Published: 13 February 2025

Published
13 February 2025
Modified
04 March 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0026 48.7th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-24861 is a high-severity Command Injection (CWE-77) vulnerability in Outbackpower Mojave Inverter Oghi8048A Firmware. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 48.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents command injection by validating and sanitizing specially-crafted POST request inputs to block malicious command payloads.

prevent

Addresses the root cause by identifying, reporting, and correcting the specific command injection flaw described in the CVE.

preventdetect

Boundary protection via proxies or web application firewalls inspects and blocks anomalous POST requests indicative of command injection attempts.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Why these techniques?

Remote unauthenticated command injection via POST in a public-facing application directly enables T1190 (Exploit Public-Facing Application) for initial access and facilitates T1059 (Command and Scripting Interpreter) for arbitrary command execution leading to data disclosure.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

An attacker may inject commands via specially-crafted post requests.

Deeper analysisAI

CVE-2025-24861, published on 2025-02-13, is a command injection vulnerability (CWE-77) that enables an attacker to inject commands via specially-crafted POST requests. It carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high confidentiality impact with no integrity or availability effects. The vulnerability affects components referenced in CISA ICS advisory ICSA-25-044-17 and the Outback Power website.

Unauthenticated attackers with network access can exploit this vulnerability with low complexity and no user interaction required. Successful exploitation allows remote command injection, potentially leading to unauthorized disclosure of sensitive information on the affected system.

For mitigation details, refer to the CISA advisory at https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-17 and Outback Power contact page at https://old.outbackpower.com/about-outback/contact/contact-us.

Details

CWE(s)

Affected Products

outbackpower
mojave inverter oghi8048a firmware
all versions

CVEs Like This One

CVE-2025-25281Same product: Outbackpower Mojave Inverter Oghi8048A
CVE-2025-26473Same product: Outbackpower Mojave Inverter Oghi8048A
CVE-2026-2333Shared CWE-77
CVE-2024-55030Shared CWE-77
CVE-2025-60801Shared CWE-77
CVE-2025-24818Shared CWE-77
CVE-2025-22630Shared CWE-77
CVE-2025-52688Shared CWE-77
CVE-2025-60021Shared CWE-77
CVE-2025-59252Shared CWE-77

References