Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2025-59814
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Unauthenticated SQL-injection in password field
Source: NVD (National Vulnerability Database)
Vulnerability Description
This vulnerability allows malicious actors to gain unauthorized access to the Zenitel ICX500 and ICX510 Gateway Billing Admin endpoint, enabling them to read the entire contents of the Billing Admin database.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
SQL命令中使用的特殊元素转义处理不恰当(SQL注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Zenitel ICX500和Zenitel ICX510 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Zenitel ICX500和Zenitel ICX510都是挪威Zenitel公司的一款通信与控制平台。 Zenitel ICX500和Zenitel ICX510存在安全漏洞,该漏洞源于恶意行为者可未经授权访问Billing Admin端点,可能导致读取数据库全部内容。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
ZenitelICX500 <1.4.3.3 -
ZenitelICX510 <1.4.3.3 -
II. Public POCs for CVE-2025-59814
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2025-59814
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2025-59814

No comments yet


Leave a comment