To successfully execute this attack, the attacker needs to be on the same network.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://community.silabs.com/068Vm00000htltZ |
|
Wed, 25 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Silabs
Silabs simplicity Installer Tool For Simplicity Studio V6 Silabs simplicity Studio V5 |
|
| Vendors & Products |
Silabs
Silabs simplicity Installer Tool For Simplicity Studio V6 Silabs simplicity Studio V5 |
Tue, 24 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 24 Mar 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Vulnerable endpoints accept user-controlled input through a URL in JSON format which enables command execution. The commands allowed to execute can open executables. However, the commands cannot pass parameters or arguments. To successfully execute this attack, the attacker needs to be on the same network. | |
| Title | Command Execution vulnerability in Simplicity Installer | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Silabs
Published:
Updated: 2026-03-24T17:43:07.517Z
Reserved: 2025-10-09T16:26:44.833Z
Link: CVE-2025-11571
Updated: 2026-03-24T17:42:59.016Z
Status : Awaiting Analysis
Published: 2026-03-24T17:16:25.863
Modified: 2026-03-25T15:41:58.280
Link: CVE-2025-11571
No data.
OpenCVE Enrichment
Updated: 2026-03-25T20:49:47Z