CVE Alert: CVE-2025-10589 – N-Partner – N-Reporter

CVE-2025-10589

HIGHNo exploitation known

The N-Reporter, N-Cloud, and N-Probe developed by N-Partner has an OS Command Injection vulnerability, allowing authenticated remote attackers to inject arbitrary OS commands and execute them on the server.

CVSS v3.1 (8.8)
AV NETWORK · AC LOW · PR LOW · UI NONE · S UNCHANGED
Vendor
N-Partner, N-Partner, N-Partner
Product
N-Reporter, N-Cloud, N-Probe
Versions
6 lt 6.1.187 | 7 lt 7.0.009 | 6 lt 6.1.187 | 7 lt 7.0.009 | 6 lt 6.1.187 | 7 lt 7.0.009
CWE
CWE-78, CWE-78 Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’)
Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Published
2025-09-17T03:31:57.615Z
Updated
2025-09-17T03:31:57.615Z

AI Summary Analysis

Risk verdict

High risk of network-based OS command injection on affected devices; exploitation requires authentication, but no user interaction, and patch urgency depends on threat signals not provided (KEV/EPSS). Treat as a high-priority concern where exposure exists, with prompt remediation recommended.

Why this matters

Authenticated attackers can inject and execute arbitrary commands with high impact, potentially taking full control of the device and enabling further network compromise. The vulnerability supports remote access over the network and could enable lateral movement or data exposure across connected systems if misconfigured or broadly reachable.

Most likely attack path

An adversary with valid admin credentials targets the device over the network, sending crafted inputs to the vulnerable component to bypass input handling. With low required privileges and no UI interaction, successful exploitation yields high impact without user action, enabling remote code execution and possible persistence within affected environments.

Who is most exposed

Organizations with internet-facing or broadly accessible management interfaces for these appliances, or those deployed in DMZs/bridges to cloud environments, are at greatest risk. Environments relying on exposed automation or monitoring agents are especially susceptible.

Detection ideas

  • Unusual or out-of-pattern command executions initiated by the device processes
  • Unexpected process spawns or shell activity tied to the appliance
  • Authentication events from unexpected sources or locations to admin interfaces
  • Anomalous outbound traffic following an authentication event
  • Logs showing failed/successful attempts to access restricted command execution endpoints

Mitigation and prioritisation

  • Apply the advised firmware updates for 6.x and 7.x lines; ensure synchronised kernel update per guidance
  • Restrict network access to management interfaces; implement MFA for admin access
  • Disable or tightly limit remote command execution features if not essential
  • Implement network segmentation and strict access controls around affected devices
  • Schedule and test patch deployment in a staging environment; verify patch efficacy before broad rollout
  • If KEV indicates exploitation or EPSS ≥ 0.5, treat as priority 1; otherwise maintain as high-priority remediation with close monitoring

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.