For u-link Management API an unauthenticated remote attacker in a man-in-the-middle position can inject arbitrary commands in responses returned by WWH servers, which are then executed with elevated privileges. To get into such a position, clients would need to use insecure proxy configurations.
References
| Link | Resource |
|---|---|
| https://certvde.com/en/advisories/VDE-2025-052 |
Configurations
No configuration.
History
23 Jul 2025, 09:15
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| CWE | ||
| Summary | For u-link Management API an unauthenticated remote attacker in a man-in-the-middle position can inject arbitrary commands in responses returned by WWH servers, which are then executed with elevated privileges. To get into such a position, clients would need to use insecure proxy configurations. |
11 Jun 2025, 09:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-06-11 09:15
Updated : 2025-07-23 09:15
NVD link : CVE-2025-41663
Mitre link : CVE-2025-41663
JSON object : View
Products Affected
No product.
CWE
No CWE.
