We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-43978



Description

Jointelli 5G CPE 21H01 firmware JY_21H01_A3_v1.36 devices allow (blind) OS command injection. Multiple endpoints are vulnerable, including /ubus/?flag=set_WPS_pin and /ubus/?flag=netAppStar1 and /ubus/?flag=set_wifi_cfgs. This allows an authenticated attacker to execute arbitrary OS commands with root privileges via crafted inputs to the SSID, WPS, Traceroute, and Ping fields.

Reserved 2025-04-21 | Published 2025-08-05 | Updated 2025-08-05 | Assigner mitre

References

www.jointelli.com/cpe/5g-cpe-evo-4.html

github.com/actuator/cve/tree/main/Jointelli

www.jointelli.com/product/25H01

github.com/...tor/cve/blob/main/Jointelli/CVE-2025-43978.txt

cve.org (CVE-2025-43978)

nvd.nist.gov (CVE-2025-43978)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-43978

Support options

Helpdesk Chat, Email, Knowledgebase