Cyber Posture

CVE-2025-2727

High

Published: 25 March 2025

Published
25 March 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0033 55.9th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-2727 is a high-severity Injection (CWE-74) vulnerability in H3C Magic NX30 (inferred from references). Its CVSS base score is 8.0 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation of Remote Services (T1210); ranked in the top 44.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SC-7 (Boundary Protection) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation of Remote Services (T1210) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-2 Flaw Remediation requires timely identification, reporting, and patching of the command injection vulnerability, aligning with advisories to upgrade the affected H3C router component.

prevent

SI-10 Information Input Validation directly prevents command injection by enforcing validation and error handling at the vulnerable /api/wizard/getNetworkStatus HTTP POST endpoint.

prevent

SC-7 Boundary Protection restricts adjacent network access to the router's management interface, blocking exploitation of the HTTP POST handler requiring local network proximity.

MITRE ATT&CK Enterprise TechniquesAI

T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Command injection in HTTP endpoint on network device enables exploitation of remote service for code execution (T1210) and direct arbitrary OS command execution via Unix shell (T1059.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

A vulnerability, which was classified as critical, was found in H3C Magic NX30 Pro up to V100R007. This affects an unknown part of the file /api/wizard/getNetworkStatus of the component HTTP POST Request Handler. The manipulation leads to command injection. Access…

more

to the local network is required for this attack to succeed. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component.

Deeper analysisAI

CVE-2025-2727 is a critical command injection vulnerability affecting H3C Magic NX30 Pro routers up to version V100R007. The issue resides in an unknown part of the /api/wizard/getNetworkStatus endpoint within the HTTP POST Request Handler component. Successful exploitation allows arbitrary command execution, as classified under CWE-74 (Improper Neutralization of Special Elements) and CWE-77 (Command Injection). The vulnerability carries a CVSS v3.1 base score of 8.0.

Exploitation requires adjacent network access (AV:A), low attack complexity (AC:L), and low privileges (PR:L), with no user interaction needed (UI:N). An attacker with local network proximity and minimal authentication can send a crafted HTTP POST request to the vulnerable endpoint, injecting and executing arbitrary operating system commands on the device. This grants high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H).

Advisories recommend upgrading the affected component to a patched version, as noted in the vulnerability description and linked H3C software download portal. Additional details are available via VulDB entries and a public GitHub disclosure containing the exploit.

The exploit has been publicly disclosed and may be actively used by attackers.

Details

CWE(s)

Affected Products

H3C
Magic NX30
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2025-2725Shared CWE-74, CWE-77
CVE-2026-7067Shared CWE-74, CWE-77
CVE-2025-2729Shared CWE-74, CWE-77
CVE-2025-2731Shared CWE-74, CWE-77
CVE-2025-14108Shared CWE-74, CWE-77
CVE-2025-14106Shared CWE-74, CWE-77
CVE-2025-7836Shared CWE-74, CWE-77
CVE-2025-15139Shared CWE-74, CWE-77
CVE-2025-14107Shared CWE-74, CWE-77
CVE-2026-20147Shared CWE-77

References