OS Command Injection Vulnerability in Wifi-soft UniBox Controller
CVE-2025-6102
Key Information:
- Vendor
Wifi-soft
- Status
- Vendor
- CVE Published:
- 16 June 2025
Badges
What is CVE-2025-6102?
A significant vulnerability has been identified in the Wifi-soft UniBox Controller, specifically affecting the /authentication/logout.php file. This vulnerability arises from improper handling of the 'mac_address' parameter, allowing for remote execution of OS commands through injection attacks. The exploit has been publicly disclosed, and the lack of response from the vendor raises concerns about the potential for exploitation in the wild. Organizations using affected versions of the UniBox Controller should take immediate steps to secure their systems against this vulnerability.
Affected Version(s)
UniBox Controller 20250506
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved