CVE-2025-13800

A vulnerability was found in ADSLR NBR1005GPEV2 250814-r037c. This issue affects the function set_mesh_disconnect of the file /send_order.cgi. The manipulation of the argument mac results in command injection. It is possible to launch the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://vuldb.com/?ctiid.333811 Permissions Required VDB Entry
https://vuldb.com/?id.333811 Third Party Advisory VDB Entry
https://vuldb.com/?submit.691942 Third Party Advisory VDB Entry
https://www.notion.so/2a70c75766a88023aa0ed833ff0239e1 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:adslr:b-qe2w401_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:adslr:b-qe2w401:-:*:*:*:*:*:*:*

History

11 Dec 2025, 22:19

Type Values Removed Values Added
CPE cpe:2.3:h:adslr:b-qe2w401:-:*:*:*:*:*:*:*
cpe:2.3:o:adslr:b-qe2w401_firmware:*:*:*:*:*:*:*:*
First Time Adslr b-qe2w401
Adslr
Adslr b-qe2w401 Firmware
References () https://vuldb.com/?ctiid.333811 - () https://vuldb.com/?ctiid.333811 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.333811 - () https://vuldb.com/?id.333811 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.691942 - () https://vuldb.com/?submit.691942 - Third Party Advisory, VDB Entry
References () https://www.notion.so/2a70c75766a88023aa0ed833ff0239e1 - () https://www.notion.so/2a70c75766a88023aa0ed833ff0239e1 - Exploit, Third Party Advisory

01 Dec 2025, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-01 02:15

Updated : 2025-12-11 22:19


NVD link : CVE-2025-13800

Mitre link : CVE-2025-13800

CVE.ORG link : CVE-2025-13800


JSON object : View

Products Affected

adslr

  • b-qe2w401_firmware
  • b-qe2w401
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')