Comfast CF-N1 2.6.0 /usr/bin/webmgnt wifilith_delete_pic_file portal_delete_picname amalungelo andlule

CVSS Meta Temp IsilinganisoIntengo yamanje ye-exploit (≈)CTI Inzalo Score
6.9$0-$5k0.00

Isifinyezoulwazi

Kukhona ubuthakathaka obubizwa ngokuthi kubalulekile kakhulu obutholakele ku Comfast CF-N1 2.6.0. Kuthinteka umsebenzi ongaziwayo kufayela /usr/bin/webmgnt. Ukusebenzisa kwepharamitha portal_delete_picname kuholela ku amalungelo andlule. Lokhu buthakathaka kuthengiswa njenge CVE-2025-9585. Kuyenzeka ukuqala ukuhlasela kude. Ngaphezu kwalokho, kukhona i-exploit etholakalayo. If you want to get best quality of vulnerability data, you may have to visit VulDB.

Iinkcukachaulwazi

Kukhona ubuthakathaka obubizwa ngokuthi kubalulekile kakhulu obutholakele ku Comfast CF-N1 2.6.0. Kuthinteka umsebenzi ongaziwayo kufayela /usr/bin/webmgnt. Ukusebenzisa kwepharamitha portal_delete_picname kuholela ku amalungelo andlule. Ukusebenzisa i-CWE ukukhomba inkinga kuholela ku-CWE-77. Ubuthakathaka babikwa. Isaziso sabelwe ukuthi singalayishwa ku-github.com.

Lokhu buthakathaka kuthengiswa njenge CVE-2025-9585. Kuyenzeka ukuqala ukuhlasela kude. Imininingwane yezobuchwepheshe iyatholakala. Udumo lwalobu buthakathi luphansi kunokujwayelekile. Ngaphezu kwalokho, kukhona i-exploit etholakalayo. Ukuhlaselwa sekudalulwe emphakathini futhi kungasetshenziswa. Njengamanje, intengo yamanje ye-exploit ingahle ibe cishe USD $0-$5k okwamanje.

Kuyenzeka ukulanda i-exploit ku-github.com.

If you want to get best quality of vulnerability data, you may have to visit VulDB.

Umkhiqizoulwazi

Umkhiqizi

Ibizo

Inguqulo

CPE 2.3ulwazi

CPE 2.2ulwazi

CVSSv4ulwazi

VulDB Umkhombandlela: 🔒
VulDB Ukuthembeka: 🔍

CNA CVSS-B Score: 🔒
CNA CVSS-BT Score: 🔒
CNA Umkhombandlela: 🔒

CVSSv3ulwazi

VulDB Ireyithingi yeMeta Base: 7.1
VulDB Meta Temp Isilinganiso: 6.9

VulDB Isilinganiso Esiyisisekelo: 6.3
VulDB Izinga Lesikhashana: 5.7
VulDB Umkhombandlela: 🔒
VulDB Ukuthembeka: 🔍

NVD Isilinganiso Esiyisisekelo: 8.8
NVD Umkhombandlela: 🔒

CNA Isilinganiso Esiyisisekelo: 6.3
CNA Umkhombandlela: 🔒

CVSSv2ulwazi

AVACAuCIA
💳💳💳💳💳💳
💳💳💳💳💳💳
💳💳💳💳💳💳
UmkhombandlelaUbunzimaUkufakazela ubuwenaUkuyimfihloUkuthembekaUkutholakala
vula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelela
vula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelela
vula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelela

VulDB Isilinganiso Esiyisisekelo: 🔒
VulDB Izinga Lesikhashana: 🔒
VulDB Ukuthembeka: 🔍

Ukusebenzisa ithuba lokungavikelekiulwazi

Ikilasi: Amalungelo andlule
CWE: CWE-77 / CWE-74 / CWE-707
CAPEC: 🔒
ATT&CK: 🔒

Okubambekayo: Hayi
Wendawo: Hayi
Kude: Yebo

Ukutholakala: 🔒
Umnyango: Umphakathi
Isimo: Ubufakazi-bokusebenza
Landa: 🔒

EPSS Score: 🔒
EPSS Percentile: 🔒

Ukukhula kwentengo: 🔍
Okwamanje ukuhlolwa kwentengo: 🔒

0-Dayvula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelela
Namuhlavula ukufinyelelavula ukufinyelelavula ukufinyelelavula ukufinyelela

Ulwazi lwezingoziulwazi

Intshisekelo: 🔍
Abadlali abasebenzayo: 🔍
AmaQembu e-APT asebenzayo: 🔍

Izinyathelo zokuvikelaulwazi

Isincomo: akukho sithathwa esaziwayo
Isimo: 🔍

0-Suku Isikhathi: 🔒

Isikhathi somlandoulwazi

2025-08-28 Isaziso sikhishwe
2025-08-28 +0 Izinsuku VulDB okokungena kwenziwe
2025-10-03 +36 Izinsuku VulDB okungenelelwe ukubuyekezwa kokugcina

Imithomboulwazi

Iseluleko: github.com
Isimo: Akuchazwanga

CVE: CVE-2025-9585 (🔒)
GCVE (CVE): GCVE-0-2025-9585
GCVE (VulDB): GCVE-100-321698
scip Labs: https://www.scip.ch/en/?labs.20161013

Ukungenaulwazi

Kudalwa: 2025-08-28 14:25
Ukuvuselelwa: 2025-10-03 06:20
Ukulungiswa: 2025-08-28 14:25 (56), 2025-08-29 08:25 (30), 2025-10-03 06:20 (16)
Kugcwele: 🔍
Umthumeli: n0ps1ed
Cache ID: 253:E54:103

Thumelaulwazi

Yamukelwa

  • Thumela #636136: COMFAST COMFAST CF-N1 V2 V2.6.0 Command Injection (kusuka ku n0ps1ed)

Ingxoxo

Kuze kube manje akukabikho ukuphawula. Izilimi: nr + nd + en.

Ngiyacela ungene ngemvume ukuze ukwazi ukuphawula.

Interested in the pricing of exploits?

See the underground prices here!