Command Injection Vulnerability in H3C Magic Device Series
CVE-2025-3545
Summary
A command injection vulnerability has been identified in multiple H3C Magic devices, specifically in the function FCGI_CheckStringIfContainsSemicolon within the /api/wizard/setLanguage file. This security issue allows local network attackers to exploit the vulnerable HTTP POST request handler, potentially executing arbitrary commands on the affected devices. Users are strongly advised to upgrade to the latest software version to mitigate any risks associated with this vulnerability.
Affected Version(s)
Magic BE18000 V100R014
Magic NX15 V100R014
Magic NX30 Pro V100R014
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved