Vulnerability Description
For u-link Management API an unauthenticated remote attacker in a man-in-the-middle position can inject arbitrary commands in responses returned by WWH servers, which are then executed with elevated privileges. To get into such a position, clients would need to use insecure proxy configurations.
CVSS Score
CRITICAL
Related Weaknesses (CWE)
References
FAQ
What is CVE-2025-41663?
CVE-2025-41663 is a vulnerability with a CVSS score of 9.8 (CRITICAL). For u-link Management API an unauthenticated remote attacker in a man-in-the-middle position can inject arbitrary commands in responses returned by WWH servers, which are then executed with elevated p...
How severe is CVE-2025-41663?
CVE-2025-41663 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-41663?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.