{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-19T04:52:47.548","vulnerabilities":[{"cve":{"id":"CVE-2025-50475","sourceIdentifier":"cve@mitre.org","published":"2025-07-31T15:15:36.830","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"An OS command injection vulnerability exists in Russound MBX-PRE-D67F firmware version 3.1.6, allowing unauthenticated attackers to execute arbitrary commands as root via crafted input to the hostname parameter in network configuration requests. This vulnerability stems from improper neutralization of special elements used in an OS command within the network configuration handler, enabling remote code execution with the highest privileges."},{"lang":"es","value":"Existe una vulnerabilidad de inyección de comandos del sistema operativo en la versión 3.1.6 del firmware Russound MBX-PRE-D67F, que permite a atacantes no autenticados ejecutar comandos arbitrarios como root mediante una entrada manipulada en el parámetro hostname en las solicitudes de configuración de red. Esta vulnerabilidad se deriva de la neutralización incorrecta de elementos especiales utilizados en un comando del sistema operativo dentro del controlador de configuración de red, lo que permite la ejecución remota de código con los privilegios más altos."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]}],"references":[{"url":"https://drive.google.com/file/d/1ZmZHzJKU-nrhFXd9w94aiGXYYYldtmni/view?usp=sharing","source":"cve@mitre.org"},{"url":"https://pastebin.com/ic8hkC5V","source":"cve@mitre.org"},{"url":"https://pastebin.com/raw/0U6F55G5","source":"cve@mitre.org"}]}}]}