PatchSiren cyber security CVE debrief
CVE-2025-56009 Keenetic CVE debrief
CVE-2025-56009 is a cross-site request forgery (CSRF) issue in KeeneticOS before 4.3 affecting the /rci API endpoint. The CVE description says an attacker can trick a victim into opening a crafted page that adds a new user with full permissions, which can lead to device takeover. The official NVD record classifies the issue as CWE-352 and assigns it a MEDIUM CVSS score.
- Vendor
- Keenetic
- Product
- KeeneticOS
- CVSS
- MEDIUM 5.3
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-10-23
- Original CVE updated
- 2026-05-20
- Advisory published
- 2025-10-23
- Advisory updated
- 2026-05-20
Who should care
Administrators and MSPs managing KeeneticOS devices, especially any systems with remote or internet-facing management access, plus security teams responsible for edge-device hardening and account review.
Technical summary
NVD lists KeeneticOS as vulnerable through versions before 4.3, with the affected CPE recorded as cpe:2.3:o:keenetic:keeneticos:* and an endExcluding version of 4.3. The issue is at the /rci API endpoint and is mapped to CWE-352. The CVE narrative says malicious web content can trigger creation of additional users with full permissions; the NVD CVSS vector is AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N.
Defensive priority
Medium. The official CVSS score is 5.3, but the described outcome affects administrative control, so exposed KeeneticOS deployments should be reviewed promptly and upgraded to 4.3 or later.
Recommended defensive actions
- Upgrade KeeneticOS to version 4.3 or later.
- Review the Keenetic security advisory linked from the CVE record for vendor guidance.
- Restrict access to router management and API interfaces, including /rci, to trusted administration paths.
- Audit user accounts and permissions for unauthorized additions or changes.
- If exposure is suspected, reset credentials and verify configuration integrity.
- Apply future KeeneticOS security updates promptly.
Evidence notes
Official records show the CVE was published on 2025-10-23 and last modified on 2026-05-20. NVD lists KeeneticOS before 4.3 as vulnerable, maps the issue to CWE-352, and provides CVSS 3.1 vector AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N. The source corpus also includes a vendor security advisory link for October 2025 web API vulnerabilities and a community writeup reference, but the debrief here is grounded in the official CVE/NVD data and the vendor advisory link listed in the record.
Official resources
-
CVE-2025-56009 CVE record
CVE.org
-
CVE-2025-56009 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
-
Source reference
[email protected] - Product
-
Mitigation or vendor reference
[email protected] - Vendor Advisory
Published 2025-10-23 and modified 2026-05-20. The public record identifies a CSRF issue in KeeneticOS before 4.3 at the /rci API endpoint and links to Keenetic's October 2025 web API vulnerability advisory.