Cyber Posture

CVE-2025-67113

CriticalRCE

Published: 19 March 2026

Published
19 March 2026
Modified
24 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0045 63.7th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-67113 is a critical-severity Code Injection (CWE-94) vulnerability in Fcc (inferred from references). Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 36.3% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents OS command injection by requiring validation of the unescaped TR-069 Download URL before it is passed into the firmware upgrade pipeline.

prevent

Addresses the specific flaw in CWMP client by identifying, prioritizing, and applying the firmware upgrade to DG3934v3@2308041842 or later.

prevent

Enforces restrictions on the types and quantity of TR-069 Download URL inputs to the CWMP client, limiting opportunities for crafted malicious payloads.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
Why these techniques?

The vulnerability is a remote OS command injection in a network-exposed CWMP/TR-069 client, enabling exploitation of a public-facing application (T1190), exploitation of remote services (T1210), and arbitrary Unix shell command execution as root (T1059.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

OS command injection in the CWMP client (/ftl/bin/cwmp) of Small Cell Sercomm SCE4255W (FreedomFi Englewood) firmware before DG3934v3@2308041842 allows remote attackers controlling the ACS endpoint to execute arbitrary commands as root via a crafted TR-069 Download URL that is passed…

more

unescaped into the firmware upgrade pipeline.

Deeper analysisAI

CVE-2025-67113, published on 2026-03-19, is an OS command injection vulnerability (CWE-94) in the CWMP client at /ftl/bin/cwmp within the Small Cell Sercomm SCE4255W (FreedomFi Englewood) firmware versions before DG3934v3@2308041842. The flaw enables unescaped input from a TR-069 Download URL to be processed in the firmware upgrade pipeline. It carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), reflecting critical severity due to its network reach, low complexity, and potential for high-impact confidentiality, integrity, and availability effects.

Remote attackers who control the ACS endpoint can exploit this vulnerability by supplying a crafted TR-069 Download URL during a firmware upgrade interaction. The unescaped URL injects and executes arbitrary OS commands as root on the targeted device, granting full system compromise without requiring user privileges or interaction.

Mitigation requires upgrading to firmware version DG3934v3@2308041842 or later, as earlier versions are affected. Additional details appear in advisories referenced at the FCC report (https://fcc.report/FCC-ID/P27-SCE4255W/4790935.pdf), FreedomFi website (https://freedomfi.com/index.html), and Nero Team blog (https://neroteam.com/blog/freedomfi-sercomm-sce4255w-englewood).

Details

CWE(s)

Affected Products

Fcc
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-3120Shared CWE-94
CVE-2025-25680Shared CWE-94
CVE-2026-25001Shared CWE-94
CVE-2026-29955Shared CWE-94
CVE-2024-54805Shared CWE-94
CVE-2025-65294Shared CWE-94
CVE-2024-54803Shared CWE-94
CVE-2025-67035Shared CWE-94
CVE-2024-44722Shared CWE-94
CVE-2024-42911Shared CWE-94

References