SQL injection vulnerability in DIAL's CentrosNet v2.64. Allows an attacker to retrieve, create, update, and delete databases by sending POST and GET requests with the 'ultralogin' parameter in '/centrosnet/ultralogin.php'.
History

Fri, 07 Nov 2025 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 07 Nov 2025 09:30:00 +0000

Type Values Removed Values Added
Description SQL injection vulnerability in DIAL's CentrosNet v2.64. Allows an attacker to retrieve, create, update, and delete databases by sending POST and GET requests with the 'ultralogin' parameter in '/centrosnet/ultralogin.php'.
Title SQL injection in DIAL's CentrosNet
Weaknesses CWE-89
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published: 2025-11-07T09:26:39.503Z

Updated: 2025-11-07T12:09:38.397Z

Reserved: 2025-09-23T10:22:37.437Z

Link: CVE-2025-10870

cve-icon Vulnrichment

Updated: 2025-11-07T12:09:34.757Z

cve-icon NVD

Status : Received

Published: 2025-11-07T10:15:38.060

Modified: 2025-11-07T10:15:38.060

Link: CVE-2025-10870

cve-icon Redhat

No data.