{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-15T01:00:07.184","vulnerabilities":[{"cve":{"id":"CVE-2025-2773","sourceIdentifier":"zdi-disclosures@trendmicro.com","published":"2025-04-23T17:16:55.420","lastModified":"2025-08-21T00:38:19.310","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"BEC Technologies Multiple Routers sys ping Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of BEC Technologies Multiple Routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.\n\nThe specific flaw exists within the management interface, which listens on TCP port 22 by default. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-25903."},{"lang":"es","value":"Vulnerabilidad de ejecución remota de código por inyección de comandos sys ping en múltiples enrutadores de BEC Technologies. Esta vulnerabilidad permite a atacantes remotos ejecutar código arbitrario en las instalaciones afectadas de múltiples enrutadores de BEC Technologies. Si bien se requiere autenticación para explotar esta vulnerabilidad, el mecanismo de autenticación existente puede eludirse. La falla específica se encuentra en la interfaz de administración, que escucha en el puerto TCP 22 por defecto. El problema se debe a la falta de validación adecuada de una cadena proporcionada por el usuario antes de usarla para ejecutar una llamada al sistema. Un atacante puede aprovechar esta vulnerabilidad para ejecutar código en el contexto del dispositivo. Era ZDI-CAN-25903."}],"metrics":{"cvssMetricV30":[{"source":"zdi-disclosures@trendmicro.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0\/AV:N\/AC:L\/PR:H\/UI:N\/S:U\/C:H\/I:H\/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}]},"weaknesses":[{"source":"zdi-disclosures@trendmicro.com","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bectechnologies:router_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"0B67386D-1A8A-462E-B088-16742C92DA66"}]}]}],"references":[{"url":"https:\/\/www.zerodayinitiative.com\/advisories\/ZDI-25-187\/","source":"zdi-disclosures@trendmicro.com","tags":["Third Party Advisory"]}]}}]}