The QVidium Opera11 device (firmware version 2.9.0-Ax4x-opera11) is vulnerable to Remote Code Execution (RCE) due to improper input validation on the /cgi-bin/net_ping.cgi endpoint. An attacker can exploit this vulnerability by sending a specially crafted GET request with a malicious parameter to inject arbitrary commands. These commands are executed with root privileges, allowing attackers to gain full control over the device. This poses a significant security risk to any device running this software.
History

Mon, 24 Nov 2025 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Qvidium
Qvidium opera11
Vendors & Products Qvidium
Qvidium opera11

Fri, 21 Nov 2025 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 19 Nov 2025 19:45:00 +0000

Type Values Removed Values Added
Description The QVidium Opera11 device (firmware version 2.9.0-Ax4x-opera11) is vulnerable to Remote Code Execution (RCE) due to improper input validation on the /cgi-bin/net_ping.cgi endpoint. An attacker can exploit this vulnerability by sending a specially crafted GET request with a malicious parameter to inject arbitrary commands. These commands are executed with root privileges, allowing attackers to gain full control over the device. This poses a significant security risk to any device running this software.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-11-19T00:00:00.000Z

Updated: 2025-11-21T15:55:29.978Z

Reserved: 2025-10-27T00:00:00.000Z

Link: CVE-2025-63213

cve-icon Vulnrichment

Updated: 2025-11-21T15:54:50.150Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-19T20:15:53.523

Modified: 2025-11-21T16:16:14.833

Link: CVE-2025-63213

cve-icon Redhat

No data.