Command Injection Vulnerability in Keyfactor RG-EW5100BE HTTP POST Handler
CVE-2025-11073

5.1MEDIUM

Key Information:

Vendor

Keyfactor

Vendor
CVE Published:
27 September 2025

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2025-11073?

A command injection vulnerability has been identified in the Keyfactor RG-EW5100BE product related to its HTTP POST Request Handler. This flaw resides in an unspecified function within the file /cgi-bin/luci/api/cmd. By manipulating the 'url' parameter, attackers can execute arbitrary commands remotely. Given that the exploit is now publicly available, it presents a significant risk to users who are utilizing the affected firmware version EW_3.0B11P280_EW5100BE-PRO_12183019. It is crucial for organizations using this product to implement security measures promptly.

Affected Version(s)

RG-EW5100BE EW_3.0B11P280_EW5100BE-PRO_12183019

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
5.1
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

s1nec (VulDB User)
.
CVE-2025-11073 : Command Injection Vulnerability in Keyfactor RG-EW5100BE HTTP POST Handler