Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
Users and administrators of affected products are advised to contact their Business Partner immediately to update to the latest version.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-21585 | Successful exploitation of the vulnerability could allow an attacker to execute arbitrary commands as root, potentially leading to the loss of confidentiality, integrity, availability, and full control of the access point. |
Wed, 16 Jul 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
Wed, 16 Jul 2025 06:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Successful exploitation of the vulnerability could allow an attacker to execute arbitrary commands as root, potentially leading to the loss of confidentiality, integrity, availability, and full control of the access point. | |
| Title | Command Injection Vulnerability in the OmniAccess Stellar over UDP Service | |
| Weaknesses | CWE-77 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: CSA
Published:
Updated: 2025-07-16T14:40:53.098Z
Reserved: 2025-06-19T06:04:41.987Z
Link: CVE-2025-52690
Updated: 2025-07-16T14:35:32.317Z
Status : Deferred
Published: 2025-07-16T07:15:23.363
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-52690
No data.
OpenCVE Enrichment
No data.
EUVD