To successfully execute this attack, the attacker needs to be on the same network.
Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://community.silabs.com/068Vm00000htltZ |
|
Tue, 24 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 24 Mar 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Vulnerable endpoints accept user-controlled input through a URL in JSON format which enables command execution. The commands allowed to execute can open executables. However, the commands cannot pass parameters or arguments. To successfully execute this attack, the attacker needs to be on the same network. | |
| Title | Command Execution vulnerability in Simplicity Installer | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Silabs
Published:
Updated: 2026-03-24T17:43:07.517Z
Reserved: 2025-10-09T16:26:44.833Z
Link: CVE-2025-11571
Updated: 2026-03-24T17:42:59.016Z
Status : Received
Published: 2026-03-24T17:16:25.863
Modified: 2026-03-24T17:16:25.863
Link: CVE-2025-11571
No data.
OpenCVE Enrichment
No data.