CVE-2025-60965
Published: 06 October 2025
Summary
CVE-2025-60965 is a critical-severity OS Command Injection (CWE-78) vulnerability in Endruntechnologies Sonoma D12 Firmware. Its CVSS base score is 9.1 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Unix Shell (T1059.004); ranked at the 33.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-2 requires timely patching of the Sonoma D12 firmware flaw, directly eliminating the OS command injection vulnerability as advised by the vendor.
SI-10 enforces input validation at vulnerable interfaces, preventing attackers from injecting malicious OS commands even with high privileges.
AC-6 least privilege restricts high-privilege access and limits damage from privilege escalation resulting from command injection exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
OS Command Injection (CWE-78) directly enables T1059.004 (Unix Shell) for arbitrary command execution on likely Unix-based firmware; remote network exploitation (AV:N/PR:H) maps to T1210 (Exploitation of Remote Services) for RCE.
NVD Description
OS Command Injection vulnerability in EndRun Technologies Sonoma D12 Network Time Server (GPS) F/W 6010-0071-000 Ver 4.00 allows attackers to execute arbitrary code, cause a denial of service, gain escalated privileges, gain sensitive information, and possibly other unspecified impacts.
Deeper analysisAI
CVE-2025-60965 is an OS Command Injection vulnerability (CWE-78) in EndRun Technologies Sonoma D12 Network Time Server (GPS) firmware version 6010-0071-000 Ver 4.00. Published on 2025-10-06T17:16:07.417, it carries a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H), indicating critical severity due to its potential for high-impact network-based exploitation.
Attackers with high privileges can exploit this vulnerability remotely over the network with low complexity and no user interaction. Successful exploitation enables arbitrary code execution, denial of service, escalated privileges, disclosure of sensitive information, and possibly other unspecified impacts, with a changed scope amplifying the consequences across confidentiality, integrity, and availability.
Advisories detailing mitigations and patches are available from the vendor at http://endrun.com and http://sonoma.com, as well as a security research advisory at https://xdiv-sec.github.io/vulnerability-research/advisories/2025-10-03-sonoma-d12.
Details
- CWE(s)