Browse all 4 CVE security advisories affecting ADSLR. AI-powered Chinese analysis, POCs, and references for each vulnerability.
ADSLR is a network access device primarily used for broadband internet connectivity in home and small office environments. Historically, it has been susceptible to multiple remote code execution vulnerabilities, cross-site scripting flaws, and privilege escalation issues. The device's web interface has been particularly targeted, with several CVEs allowing unauthorized access or system compromise. ADSLR's security posture has been concerning due to infrequent updates and default administrative credentials. While no major public incidents have been widely documented, the accumulation of four CVEs indicates ongoing security challenges that could expose networks to unauthorized access or further exploitation.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-13800 | ADSLR NBR1005GPEV2 send_order.cgi set_mesh_disconnect command injection — NBR1005GPEV2CWE-77 | 6.3 | Medium | 2025-12-01 |
| CVE-2025-13799 | ADSLR NBR1005GPEV2 send_order.cgi ap_macfilter_del command injection — NBR1005GPEV2CWE-77 | 6.3 | Medium | 2025-12-01 |
| CVE-2025-13798 | ADSLR NBR1005GPEV2 send_order.cgi ap_macfilter_add command injection — NBR1005GPEV2CWE-77 | 6.3 | Medium | 2025-12-01 |
| CVE-2025-13797 | ADSLR B-QE2W401 send_order.cgi parameterdel_swifimac command injection — B-QE2W401CWE-77 | 6.3 | Medium | 2025-12-01 |
This page lists every published CVE security advisory associated with ADSLR. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.