PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-56007 Keenetic CVE debrief

CVE-2025-56007 describes a CRLF-injection issue in KeeneticOS before 4.3 at the /auth API endpoint. According to the supplied CVE description, an attacker can abuse a victim’s browser interaction with a crafted page to create additional users with full permissions and take over the device. NVD lists the issue as CVSS 3.1 6.5 (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H).

Vendor
Keenetic
Product
KeeneticOS
CVSS
MEDIUM 6.5
CISA KEV
Not listed in stored evidence
Original CVE published
2025-10-23
Original CVE updated
2026-05-20
Advisory published
2025-10-23
Advisory updated
2026-05-20

Who should care

Organizations and individuals running KeeneticOS appliances, especially any device exposed to untrusted browsing activity or managed in small-office/home-office environments. Security and operations teams should care most where local admin compromise would expose internal networks, internet access, or remote management.

Technical summary

The available record identifies a CRLF-injection weakness in KeeneticOS at the "/auth" API endpoint, affecting versions before 4.3. The described outcome is unauthorized creation of additional users with full permissions after the victim is induced to open a crafted page. NVD maps the weakness to CWE-93 and provides the CVSS vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H, indicating network reachability, low attack complexity, no prior privileges, and required user interaction.

Defensive priority

High for any KeeneticOS deployment below 4.3, because the issue can lead to full device compromise after user interaction. Treat it as a patch-now issue if the device is internet-reachable or if administrators commonly browse the web from the same trust zone.

Recommended defensive actions

  • Upgrade KeeneticOS to version 4.3 or later as soon as possible.
  • Review the vendor security page for the October 2025 web API vulnerabilities advisory and confirm the affected models and remediation notes.
  • Check existing user accounts on affected devices for unexpected or newly added full-privilege accounts.
  • Restrict management access to trusted networks and administrative devices while remediation is pending.
  • Reduce exposure to untrusted links or pages on systems used to administer the device, since the reported attack path requires user interaction.

Evidence notes

This debrief is based only on the supplied CVE/NVD metadata and linked references. The CVE description states the issue, affected version boundary, endpoint, and impact; NVD provides the CVSS vector, CWE mapping, and affected CPE range. The supplied corpus does not include the full vendor advisory text, so mitigation details are limited to the documented version boundary and linked official references. Published at 2025-10-23T15:15:39.097Z; modified at 2026-05-20T20:16:33.837Z.

Official resources

Publicly disclosed on 2025-10-23; the NVD record was last modified on 2026-05-20.