Description
Successful exploitation of the vulnerability could allow an unauthenticated attacker to obtain a valid session ID with administrator privileges by spoofing the login request, potentially allowing the attacker to modify the behaviour of the access point.
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2025-52689, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2025-52689 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.
References:
- https://capec.mitre.org/data/definitions/196.html
- https://capec.mitre.org/data/definitions/21.html
- https://capec.mitre.org/data/definitions/31.html
- https://capec.mitre.org/data/definitions/39.html
- https://capec.mitre.org/data/definitions/59.html
- https://capec.mitre.org/data/definitions/60.html
- https://capec.mitre.org/data/definitions/61.html
- https://nvd.nist.gov/vuln/detail/CVE-2025-52689