Vulnerable endpoints accept user-controlled input through a URL in JSON format which enables command execution. The commands allowed to execute can open executables. However, the commands cannot pass parameters or arguments.
To successfully execute this attack, the attacker needs to be on the same network.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://community.silabs.com/068Vm00000htltZ |
|
History
Tue, 24 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 24 Mar 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Vulnerable endpoints accept user-controlled input through a URL in JSON format which enables command execution. The commands allowed to execute can open executables. However, the commands cannot pass parameters or arguments. To successfully execute this attack, the attacker needs to be on the same network. | |
| Title | Command Execution vulnerability in Simplicity Installer | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Silabs
Published:
Updated: 2026-03-24T17:43:07.517Z
Reserved: 2025-10-09T16:26:44.833Z
Link: CVE-2025-11571
Updated: 2026-03-24T17:42:59.016Z
Status : Received
Published: 2026-03-24T17:16:25.863
Modified: 2026-03-24T17:16:25.863
Link: CVE-2025-11571
No data.
OpenCVE Enrichment
No data.