CVE-2025-22905
RE11S Command Injection Vulnerability
Description
RE11S v1.11 was discovered to contain a command injection vulnerability via the command parameter at /goform/mp.
INFO
Published Date :
Jan. 16, 2025, 3:15 a.m.
Last Modified :
April 9, 2025, 6:44 p.m.
Remotely Exploit :
Yes !
Source :
[email protected]
CVSS Scores
| Score | Version | Severity | Vector | Exploitability Score | Impact Score | Source | 
|---|---|---|---|---|---|---|
| CVSS 3.1 | CRITICAL | 134c704f-9b21-4f2e-91b3-4a467353bcc0 | 
Solution
- Update RE11S to the latest version available.
 - Review vendor advisories for specific patch information.
 - Restrict access to the affected command parameter.
 - Implement input validation for the command parameter.
 
References to Advisories, Solutions, and Tools
                                            Here, you will find a curated list of external links that provide in-depth
                                            information, practical solutions, and valuable tools related to
                                            CVE-2025-22905.
                                        
| URL | Resource | 
|---|---|
| http://re11s.com | Broken Link Not Applicable | 
| https://github.com/xyqer1/RE11S_1.11-mp-CommandInjection | Exploit Third Party Advisory | 
| https://www.edimax.com/edimax/global/ | Product | 
CWE - Common Weakness Enumeration
            While CVE identifies
            specific instances of vulnerabilities, CWE categorizes the common flaws or
            weaknesses that can lead to vulnerabilities. CVE-2025-22905 is
            associated with the following CWEs:
        
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
            (CAPEC)
            stores attack patterns, which are descriptions of the common attributes and
            approaches employed by adversaries to exploit the CVE-2025-22905
            weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
			The following list is the news that have been mention
			CVE-2025-22905 vulnerability anywhere in the article.
		
- 
                                                            
                                                                
CybersecurityNews
 
RondoDox Botnet Exploits 50+ Vulnerabilities to Attack Routers, CCTV Systems and Web Servers
Since its emergence in early 2025, RondoDox has rapidly become one of the most pervasive IoT-focused botnets in operation, targeting a wide range of network-connected devices—from consumer routers to ... Read more
- 
                                                            
                                                                
Daily CyberSecurity
 
RondoDox Botnet Unleashed: New Malware Uses ‘Exploit Shotgun’ to Target 50+ Router and IoT Flaws
Trend Micro has uncovered a rapidly expanding botnet campaign dubbed RondoDox, which is targeting a wide spectrum of internet-exposed devices — from routers and DVRs to CCTV systems and industrial net ... Read more
- 
                                                            
                                                                
BleepingComputer
 
RondoDox botnet targets 56 n-day flaws in worldwide attacks
A new large-scale botnet called RondoDox is targeting 56 vulnerabilities in more than 30 distinct devices, including flaws first disclosed during Pwn2Own hacking competitions. The attacker focuses on ... Read more
- 
                                                            
                                                                
Trend Micro
 
RondoDox: From Targeting Pwn2Own Vulnerabilities to Shotgunning Exploits
Cyber Threats Trend™ Research and ZDI Threat Hunters have identified a large-scale RondoDox botnet campaign exploiting over 50 vulnerabilities across more than 30 vendors, including flaws first seen i ... Read more
                The following table lists the changes that have been made to the
                CVE-2025-22905 vulnerability over time.
            
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
- 
                            
Initial Analysis by [email protected]
Apr. 09, 2025
Action Type Old Value New Value Added CPE Configuration AND OR *cpe:2.3:o:edimax:re11s_firmware:1.11:*:*:*:*:*:*:* OR cpe:2.3:h:edimax:re11s:-:*:*:*:*:*:*:* Added Reference Type MITRE: http://re11s.com Types: Broken Link, Not Applicable Added Reference Type MITRE: https://github.com/xyqer1/RE11S_1.11-mp-CommandInjection Types: Exploit, Third Party Advisory Added Reference Type MITRE: https://www.edimax.com/edimax/global/ Types: Product  - 
                            
CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0
Mar. 20, 2025
Action Type Old Value New Value Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Added CWE CWE-94  - 
                            
CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0
Feb. 18, 2025
Action Type Old Value New Value Removed CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Removed CWE CWE-94  - 
                            
CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0
Jan. 16, 2025
Action Type Old Value New Value Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Added CWE CWE-94  - 
                            
New CVE Received by [email protected]
Jan. 16, 2025
Action Type Old Value New Value Added Description RE11S v1.11 was discovered to contain a command injection vulnerability via the command parameter at /goform/mp. Added Reference http://re11s.com Added Reference https://github.com/xyqer1/RE11S_1.11-mp-CommandInjection Added Reference https://www.edimax.com/edimax/global/