← Back to CVEs
CVE-2025-52689
CRITICAL9.8
Description
Successful exploitation of the vulnerability could allow an unauthenticated attacker to obtain a valid session ID with administrator privileges by spoofing the login request, potentially allowing the attacker to modify the behaviour of the access point.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published7/16/2025
Last Modified7/16/2025
Sourcenvd
Honeypot Sightings0
Weaknesses (CWE)
CWE-384
References
https://blog.uhg.sg/article/24.html(5f57b9bf-260d-4433-bf07-b6a79e9bb7d4)
https://www.al-enterprise.com/-/media/assets/internet/documents/sa-n0150-omniaccess-stellar-multiple-vulnerabilities.pdf(5f57b9bf-260d-4433-bf07-b6a79e9bb7d4)
https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-072/(5f57b9bf-260d-4433-bf07-b6a79e9bb7d4)
https://github.com/UltimateHG/CVE-2025-52689-PoC(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.