Vulnerability identifier: #VU103473
Vulnerability risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2025-0680
CWE-ID:
CWE-78
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
OM500 IP-PBX
Hardware solutions /
Firmware
MX8G VoIP Gateway
Hardware solutions /
Firmware
NRP1302/P Desktop IP Phone
Hardware solutions /
Firmware
Vendor: New Rock Technologies
Description
The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.
The vulnerability exists due to improper input validation in the device cloud rpc command handling process. A remote unauthenticated attacker can pass specially crafted data to the application and execute arbitrary OS commands on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versions
OM500 IP-PBX: All versions
MX8G VoIP Gateway: All versions
NRP1302/P Desktop IP Phone: All versions
External links
https://www.cisa.gov/news-events/ics-advisories/icsa-25-030-02
https://www.newrocktech.com/ContactUs/index.html
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.