Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-20213— Cisco Catalyst SDWAN Manager Arbitrary File Overwrite Vulnerability

CVSS 5.5 · Medium EPSS 0.08% · P23
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-20213

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Cisco Catalyst SDWAN Manager Arbitrary File Overwrite Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability in the CLI of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, local attacker to overwrite arbitrary files on the local file system of an affected device. To exploit this vulnerability, the attacker must have valid read-only credentials with CLI access on the affected system. This vulnerability is due to improper access controls on files that are on the local file system. An attacker could exploit this vulnerability by running a series of crafted commands on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device and gain privileges of the root user. To exploit this vulnerability, an attacker would need to have CLI access as a low-privilege user.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Cisco Catalyst SD-WAN Manager 操作系统命令注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Cisco Catalyst SD-WAN Manager(Cisco SD-WAN vManage)是美国思科(Cisco)公司的一个高度可定制的仪表板。可简化和自动化 Cisco SD-WAN 的部署、配置、管理和操作。 Cisco Catalyst SD-WAN Manager存在操作系统命令注入漏洞,该漏洞源于文件访问控制不当,可能导致文件覆盖攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
CiscoCisco Catalyst SD-WAN Manager 20.1.12 -

II. Public POCs for CVE-2025-20213

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-20213

登录查看更多情报信息。

Same Patch Batch · Cisco · 2025-05-07 · 35 CVEs total

CVE-2025-2018810.0 CRITICALCisco IOS XE 信任管理问题漏洞
CVE-2025-201868.8 HIGHCisco IOS XE 操作系统命令注入漏洞
CVE-2025-201828.6 HIGHCisco Adaptive Security Appliance Software, Firepower Threat Defense Software and IOS XE S
CVE-2025-201548.6 HIGHCisco IOS, IOS XE and IOS XR Software TWAMP Denial of Service Vulnerability
CVE-2025-201628.6 HIGHCisco IOS XE 资源管理错误漏洞
CVE-2025-201648.3 HIGHCisco IOS 安全漏洞
CVE-2025-201227.8 HIGHCisco Catalyst SD-WAN Manager Privilege Escalation Vulnerability
CVE-2025-201927.7 HIGHCisco IOS XE 安全漏洞
CVE-2025-201917.4 HIGHMultiple Cisco Products Denial of Service Vulnerability
CVE-2025-202027.4 HIGHCisco IOS XE Wireless Controller Software 安全漏洞
CVE-2025-201897.4 HIGHCisco IOS XE 安全漏洞
CVE-2025-201407.4 HIGHCisco IOS XE 安全漏洞
CVE-2025-202107.3 HIGHCisco Catalyst Center Unprotected API Endpoint
CVE-2025-201976.7 MEDIUMCisco IOS XE 输入验证错误漏洞
CVE-2025-202016.7 MEDIUMCisco IOS XE 代码问题漏洞
CVE-2025-202006.7 MEDIUMCisco IOS XE 代码问题漏洞
CVE-2025-201906.5 MEDIUMCisco IOS XE Wireless Controller Software 访问控制错误漏洞
CVE-2025-201936.5 MEDIUMCisco IOS XE 操作系统命令注入漏洞
CVE-2025-201876.5 MEDIUMCisco SD-WAN Manager Software Arbitrary File Creation Vulnerability
CVE-2025-201556.0 MEDIUMCisco IOS XE 安全漏洞

Showing top 20 of 35 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2025-20213

No comments yet


Leave a comment