A vulnerability has been identified in Genexis Platinum P4410 router (Firmware P4410-V2–1.41) that allows a local network attacker to achieve Remote Code Execution (RCE) with root privileges. The issue occurs due to improper session invalidation after administrator logout. When an administrator logs out, the session token remains valid. An attacker on the local network can reuse this stale token to send crafted requests via the router’s diagnostic endpoint, resulting in command execution as root.
History

Mon, 08 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-613
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 05 Dec 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Genexis
Genexis platinum
Genexis platinum P4410
Vendors & Products Genexis
Genexis platinum
Genexis platinum P4410

Thu, 04 Dec 2025 19:45:00 +0000

Type Values Removed Values Added
Description A vulnerability has been identified in Genexis Platinum P4410 router (Firmware P4410-V2–1.41) that allows a local network attacker to achieve Remote Code Execution (RCE) with root privileges. The issue occurs due to improper session invalidation after administrator logout. When an administrator logs out, the session token remains valid. An attacker on the local network can reuse this stale token to send crafted requests via the router’s diagnostic endpoint, resulting in command execution as root.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-12-04T00:00:00.000Z

Updated: 2025-12-08T16:04:02.641Z

Reserved: 2025-11-18T00:00:00.000Z

Link: CVE-2025-65883

cve-icon Vulnrichment

Updated: 2025-12-08T16:03:51.240Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-04T20:16:19.770

Modified: 2025-12-08T18:27:15.857

Link: CVE-2025-65883

cve-icon Redhat

No data.