A critical OS Command Injection vulnerability has been identified in the FAST LTA Silent Brick WebUI, allowing remote attackers to execute arbitrary operating system commands via specially crafted input. This vulnerability arises due to improper handling of untrusted input, which is passed directly to system-level commands without adequate sanitization or validation. Successful exploitation could allow attackers to execute arbitrary commands on the affected system, potentially resulting in unauthorized access, data leakage, or full system compromise. Affected WebUI parameters are "hd" and "pi".
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.fast-lta.de/de/fast/silent-bricks-software-2-63 |
![]() ![]() |
History
Mon, 31 Mar 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 31 Mar 2025 08:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A critical OS Command Injection vulnerability has been identified in the FAST LTA Silent Brick WebUI, allowing remote attackers to execute arbitrary operating system commands via specially crafted input. This vulnerability arises due to improper handling of untrusted input, which is passed directly to system-level commands without adequate sanitization or validation. Successful exploitation could allow attackers to execute arbitrary commands on the affected system, potentially resulting in unauthorized access, data leakage, or full system compromise. Affected WebUI parameters are "hd" and "pi". | |
Title | OS Command Injection Vulnerability in FAST LTA Silent Brick WebUI | |
Weaknesses | CWE-78 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: SEC-VLab
Published: 2025-03-31T08:33:53.271Z
Updated: 2025-03-31T16:26:54.053Z
Reserved: 2025-03-06T18:18:48.091Z
Link: CVE-2025-2071

Updated: 2025-03-31T16:26:43.125Z

Status : Awaiting Analysis
Published: 2025-03-31T09:15:14.807
Modified: 2025-04-01T20:26:30.593
Link: CVE-2025-2071

No data.