Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Sat, 15 Nov 2025 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-89 | |
| CPEs | cpe:2.3:a:synchroweb:kiwire:3.6:*:*:*:*:*:*:* |
Mon, 03 Nov 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 21 Oct 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Synchroweb
Synchroweb kiwire |
|
| Vendors & Products |
Synchroweb
Synchroweb kiwire |
Tue, 14 Oct 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Fri, 10 Oct 2025 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Kiwire Captive Portal contains a blind SQL injection in the nas-id parameter, allowing for SQL commands to be issued and to compromise the corresponding database. | |
| Title | CVE-2025-11188 | |
| References |
|
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2025-11-03T17:31:39.369Z
Reserved: 2025-09-30T12:21:36.240Z
Link: CVE-2025-11188
Updated: 2025-11-03T17:31:39.369Z
Status : Analyzed
Published: 2025-10-10T11:15:40.407
Modified: 2025-11-14T23:46:44.703
Link: CVE-2025-11188
No data.
OpenCVE Enrichment
Updated: 2025-10-21T13:14:09Z