Home

Description

SQL injection vulnerability in DIAL's CentrosNet v2.64. Allows an attacker to retrieve, create, update, and delete databases by sending POST and GET requests with the 'ultralogin' parameter in '/centrosnet/ultralogin.php'.

PUBLISHED Reserved 2025-09-23 | Published 2025-11-07 | Updated 2025-11-07 | Assigner INCIBE




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

Default status
unaffected

prior to 2.65
affected

Credits

Arnau Yepes finder

References

www.incibe.es/...otices/aviso/sql-injection-dials-centrosnet

cve.org (CVE-2025-10870)

nvd.nist.gov (CVE-2025-10870)

Download JSON