We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-41379

Injection vulnerability in Iridium Certus 700



Description

The Intellian C700 web panel allows you to add firewall rules. Each of these rules has an associated ID, but there is a problem when adding a new rule, the ID used to create the database entry may be different from the JSON ID. If the rule needs to be deleted later, the system will use the JSON ID and therefore fail. This can be exploited by an attacker to create rules that cannot be deleted unless the device is reset to factory defaults.

Reserved 2025-04-16 | Published 2025-05-23 | Updated 2025-05-23 | Assigner INCIBE


MEDIUM: 6.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:N

Problem types

CWE-20 Improper Input Validation

Product status

Default status
unaffected

1.0.1
affected

Credits

Gabriel González García finder

References

www.incibe.es/...ities-intellian-technologies-iridium-certus

cve.org (CVE-2025-41379)

nvd.nist.gov (CVE-2025-41379)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-41379

Support options

Helpdesk Chat, Email, Knowledgebase