Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 15 Jan 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Qvidium opera11 Firmware
|
|
| CPEs | cpe:2.3:h:qvidium:opera11:-:*:*:*:*:*:*:* cpe:2.3:o:qvidium:opera11_firmware:2.9.0-ax4x-opera11:*:*:*:*:*:*:* |
|
| Vendors & Products |
Qvidium opera11 Firmware
|
Mon, 24 Nov 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Qvidium
Qvidium opera11 |
|
| Vendors & Products |
Qvidium
Qvidium opera11 |
Fri, 21 Nov 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-20 | |
| Metrics |
cvssV3_1
|
Wed, 19 Nov 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The QVidium Opera11 device (firmware version 2.9.0-Ax4x-opera11) is vulnerable to Remote Code Execution (RCE) due to improper input validation on the /cgi-bin/net_ping.cgi endpoint. An attacker can exploit this vulnerability by sending a specially crafted GET request with a malicious parameter to inject arbitrary commands. These commands are executed with root privileges, allowing attackers to gain full control over the device. This poses a significant security risk to any device running this software. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-21T15:55:29.978Z
Reserved: 2025-10-27T00:00:00.000Z
Link: CVE-2025-63213
Updated: 2025-11-21T15:54:50.150Z
Status : Analyzed
Published: 2025-11-19T20:15:53.523
Modified: 2026-01-15T18:49:01.660
Link: CVE-2025-63213
No data.
OpenCVE Enrichment
Updated: 2025-11-24T09:10:33Z