Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 15 Jan 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Qvidium opera11 Firmware
|
|
| CPEs | cpe:2.3:h:qvidium:opera11:-:*:*:*:*:*:*:* cpe:2.3:o:qvidium:opera11_firmware:2.9.0-ax4x-opera11:*:*:*:*:*:*:* |
|
| Vendors & Products |
Qvidium opera11 Firmware
|
Mon, 24 Nov 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Qvidium
Qvidium opera11 |
|
| Vendors & Products |
Qvidium
Qvidium opera11 |
Fri, 21 Nov 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-20 | |
| Metrics |
cvssV3_1
|
Wed, 19 Nov 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The QVidium Opera11 device (firmware version 2.9.0-Ax4x-opera11) is vulnerable to Remote Code Execution (RCE) due to improper input validation on the /cgi-bin/net_ping.cgi endpoint. An attacker can exploit this vulnerability by sending a specially crafted GET request with a malicious parameter to inject arbitrary commands. These commands are executed with root privileges, allowing attackers to gain full control over the device. This poses a significant security risk to any device running this software. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-21T15:55:29.978Z
Reserved: 2025-10-27T00:00:00.000Z
Link: CVE-2025-63213
Updated: 2025-11-21T15:54:50.150Z
Status : Analyzed
Published: 2025-11-19T20:15:53.523
Modified: 2026-01-15T18:49:01.660
Link: CVE-2025-63213
No data.
OpenCVE Enrichment
Updated: 2025-11-24T09:10:33Z