We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Jointelli 5G CPE 21H01 firmware JY_21H01_A3_v1.36 devices allow (blind) OS command injection. Multiple endpoints are vulnerable, including /ubus/?flag=set_WPS_pin and /ubus/?flag=netAppStar1 and /ubus/?flag=set_wifi_cfgs. This allows an authenticated attacker to execute arbitrary OS commands with root privileges via crafted inputs to the SSID, WPS, Traceroute, and Ping fields.
Reserved 2025-04-21 | Published 2025-08-05 | Updated 2025-08-05 | Assigner mitrewww.jointelli.com/cpe/5g-cpe-evo-4.html
github.com/actuator/cve/tree/main/Jointelli
www.jointelli.com/product/25H01
github.com/...tor/cve/blob/main/Jointelli/CVE-2025-43978.txt
Support options