Description
Vulnerable endpoints accept user-controlled input through a URL in JSON format which enables command execution. The commands allowed to execute can open executables. However, the commands cannot pass parameters or arguments. 
To successfully execute this attack, the attacker needs to be on the same network.
Published: 2026-03-24
Score: 2.1 Low
EPSS: < 1% Very Low
KEV: No
Impact: Command Execution
Action: Assess Impact
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Silabs
Silabs simplicity Installer Tool For Simplicity Studio V6
Silabs simplicity Studio V5
Vendors & Products Silabs
Silabs simplicity Installer Tool For Simplicity Studio V6
Silabs simplicity Studio V5

Tue, 24 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Mar 2026 17:00:00 +0000

Type Values Removed Values Added
Description Vulnerable endpoints accept user-controlled input through a URL in JSON format which enables command execution. The commands allowed to execute can open executables. However, the commands cannot pass parameters or arguments.  To successfully execute this attack, the attacker needs to be on the same network.
Title Command Execution vulnerability in Simplicity Installer
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 2.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Silabs Simplicity Installer Tool For Simplicity Studio V6 Simplicity Studio V5
cve-icon MITRE

Status: PUBLISHED

Assigner: Silabs

Published:

Updated: 2026-03-24T17:43:07.517Z

Reserved: 2025-10-09T16:26:44.833Z

Link: CVE-2025-11571

cve-icon Vulnrichment

Updated: 2026-03-24T17:42:59.016Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-24T17:16:25.863

Modified: 2026-03-25T15:41:58.280

Link: CVE-2025-11571

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T20:49:47Z

Weaknesses