Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-65883

EPSS 0.08% · P24
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-65883

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability has been identified in Genexis Platinum P4410 router (Firmware P4410-V2–1.41) that allows a local network attacker to achieve Remote Code Execution (RCE) with root privileges. The issue occurs due to improper session invalidation after administrator logout. When an administrator logs out, the session token remains valid. An attacker on the local network can reuse this stale token to send crafted requests via the router’s diagnostic endpoint, resulting in command execution as root.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Genexis Platinum P4410 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Genexis Platinum P4410是荷兰Genexis公司的一款家庭网关单元。 Genexis Platinum P4410 router Firmware P4410-V2–1.41版本存在安全漏洞,该漏洞源于管理员注销后会话令牌仍有效,可能导致远程代码执行。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2025-65883

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-65883

登录查看更多情报信息。

Same Patch Batch · n/a · 2025-12-04 · 32 CVEs total

CVE-2025-140124.7 MEDIUMJIZHICMS Batch Delete Comments deleteAll.html delete sql injection
CVE-2025-140114.7 MEDIUMJIZHICMS Add Display Name Field addcomment.html commentlist sql injection
CVE-2025-140132.4 LOWJIZHICMS Comment addcomment.html cross site scripting
CVE-2025-63364Waveshare RS232/485 TO WIFI ETH (B) 安全漏洞
CVE-2025-65899Kalmia 安全漏洞
CVE-2025-66373Akamai Ghost 安全漏洞
CVE-2025-63363Waveshare RS232/485 TO WIFI ETH (B) 安全漏洞
CVE-2025-63361Waveshare RS232/485 TO WIFI ETH (B) 安全漏洞
CVE-2025-63362Waveshare RS232/485 TO WIFI ETH (B) 安全漏洞
CVE-2025-65637Logrus 安全漏洞
CVE-2025-65806e-point CMS 安全漏洞
CVE-2025-29268ALLNET ALL-RUT22GW v3.3.8 安全漏洞
CVE-2025-29269ALLNET ALL-RUT22GW 安全漏洞
CVE-2025-63499SOGo 安全漏洞
CVE-2025-63896JXL 9 Inch Car Android Double Din Player 安全漏洞
CVE-2025-55948X-SpringBoot 安全漏洞
CVE-2025-65900Kalmia 安全漏洞
CVE-2025-65516Seafile Community Edition 安全漏洞
CVE-2025-61148EduplusCampus 安全漏洞
CVE-2025-57210Weitong Mall 安全漏洞

Showing top 20 of 32 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2025-65883

No comments yet


Leave a comment