CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-2731: H3C Magic BE18000 HTTP POST Request getDualbandSync command injection

8.7 CVSS

Description

A vulnerability was found in H3C Magic NX15, Magic NX30 Pro, Magic NX400, Magic R3010 and Magic BE18000 up to V100R014. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /api/wizard/getDualbandSync of the component HTTP POST Request Handler. The manipulation leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. In H3C Magic NX15, Magic NX30 Pro, Magic NX400, Magic R3010 and Magic BE18000 bis V100R014 wurde eine kritische Schwachstelle ausgemacht. Das betrifft eine unbekannte Funktionalität der Datei /api/wizard/getDualbandSync der Komponente HTTP POST Request Handler. Dank der Manipulation mit unbekannten Daten kann eine command injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung.

Classification

CVE ID: CVE-2025-2731

CVSS Base Severity: HIGH

CVSS Base Score: 8.7

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem Types

Command Injection Injection

Affected Products

Vendor: H3C, H3C, H3C, H3C, H3C

Product: Magic NX15, Magic NX30 Pro, Magic NX400, Magic R3010, Magic BE18000

Exploit Prediction Scoring System (EPSS)

EPSS Score: 1.54% (probability of being exploited)

EPSS Percentile: 80.3% (scored less or equal to compared to others)

EPSS Date: 2025-04-23 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-2731
https://vuldb.com/?id.300751
https://vuldb.com/?ctiid.300751
https://vuldb.com/?submit.520497
https://github.com/Qwen11/CVE_store/blob/main/H3C/vulnerability%20Information_3.md

Timeline