Vulnerability Description
A vulnerability, which was classified as critical, has been found in H3C Magic NX15, Magic NX30 Pro, Magic NX400 and Magic R3010 up to V100R014. Affected by this issue is the function FCGI_WizardProtoProcess of the file /api/wizard/getSpecs of the component HTTP POST Request Handler. The manipulation leads to command injection. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://gist.github.com/mono7s/fcbc1f02d69547704cc9027b29e51c73
- https://vuldb.com/?ctiid.304580
- https://vuldb.com/?id.304580
- https://vuldb.com/?submit.524737
- https://www.h3c.com/cn/Service/Document_Software/Software_Download/Consume_produ
- https://zhiliao.h3c.com/theme/details/229784
FAQ
What is CVE-2025-3541?
CVE-2025-3541 is a vulnerability with a CVSS score of 8.0 (HIGH). A vulnerability, which was classified as critical, has been found in H3C Magic NX15, Magic NX30 Pro, Magic NX400 and Magic R3010 up to V100R014. Affected by this issue is the function FCGI_WizardProto...
How severe is CVE-2025-3541?
CVE-2025-3541 has been rated HIGH with a CVSS base score of 8.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-3541?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.