Vulnerability Description
A vulnerability, which was classified as critical, was found in H3C Magic NX30 Pro up to V100R007. This affects an unknown part of the file /api/wizard/getNetworkStatus of the component HTTP POST Request Handler. The manipulation leads to command injection. Access to the local network is required for this attack to succeed. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://github.com/ggstrunk/CVE/blob/main/wizard_getNetworkStatus.md
- https://vuldb.com/?ctiid.300747
- https://vuldb.com/?id.300747
- https://vuldb.com/?submit.520394
- https://www.h3c.com/cn/Service/Document_Software/Software_Download/Consume_produ
- https://zhiliao.h3c.com/theme/details/229784
FAQ
What is CVE-2025-2727?
CVE-2025-2727 is a vulnerability with a CVSS score of 8.0 (HIGH). A vulnerability, which was classified as critical, was found in H3C Magic NX30 Pro up to V100R007. This affects an unknown part of the file /api/wizard/getNetworkStatus of the component HTTP POST Requ...
How severe is CVE-2025-2727?
CVE-2025-2727 has been rated HIGH with a CVSS base score of 8.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-2727?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.