The QVidium Opera11 device (firmware version 2.9.0-Ax4x-opera11) is vulnerable to Remote Code Execution (RCE) due to improper input validation on the /cgi-bin/net_ping.cgi endpoint. An attacker can exploit this vulnerability by sending a specially crafted GET request with a malicious parameter to inject arbitrary commands. These commands are executed with root privileges, allowing attackers to gain full control over the device. This poses a significant security risk to any device running this software.
Metrics
Affected Vendors & Products
References
History
Mon, 24 Nov 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Qvidium
Qvidium opera11 |
|
| Vendors & Products |
Qvidium
Qvidium opera11 |
Fri, 21 Nov 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-20 | |
| Metrics |
cvssV3_1
|
Wed, 19 Nov 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The QVidium Opera11 device (firmware version 2.9.0-Ax4x-opera11) is vulnerable to Remote Code Execution (RCE) due to improper input validation on the /cgi-bin/net_ping.cgi endpoint. An attacker can exploit this vulnerability by sending a specially crafted GET request with a malicious parameter to inject arbitrary commands. These commands are executed with root privileges, allowing attackers to gain full control over the device. This poses a significant security risk to any device running this software. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-11-19T00:00:00.000Z
Updated: 2025-11-21T15:55:29.978Z
Reserved: 2025-10-27T00:00:00.000Z
Link: CVE-2025-63213
Updated: 2025-11-21T15:54:50.150Z
Status : Awaiting Analysis
Published: 2025-11-19T20:15:53.523
Modified: 2025-11-21T16:16:14.833
Link: CVE-2025-63213
No data.