CVE-2025-9974
Insufficient Input Validation on WEBUI in Nokia ONT/Beacon product
Public disclosure |
02-02-2026 |
|---|---|
Last updated |
02-02-2026 |
Vulnerability type |
Authenticated OS command injection |
CVSS vector |
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVSS score |
8.0 |
Description
The unified WEBUI application of the ONT/Beacon device contains an input handling flaw that allows authenticated users to trigger unintended system-level command execution. Due to insufficient validation of user-supplied data, a low-privileged authenticated attacker may be able to execute arbitrary commands on the underlying ONT/Beacon operating system, potentially impacting the confidentiality, integrity, and availability of the device.
Affected products and versions
All supported releases prior to BBDR2503
Product |
Versions |
|---|---|
Beacon 1.1 |
All supported releases prior to BBDR2503 |
Beacon 2 |
|
Beacon 6 |
|
Beacon 10 |
|
Beacon 19 |
|
Beacon 24 |
|
Beacon 3.2 |
|
Beacon G3.1 |
|
Beacon G6 |
|
Beacon 3.1 |
|
G-010G-D |
|
G-1426G-A |
|
G-1426G-C |
|
G-1426G-D |
|
G-1426G-E |
|
G-240G-H |
|
XS-2426G-B |
|
XS-2426X-A |
|
XS-240X-A |
|
XS-220X-A |
|
XS-140X-A |
|
XS-1426X-A |
|
XS-2437X-B |
|
U-040X-A |
Mitigation plan
The fix has been delivered in BBDR2503 and later releases. Please contact Nokia support for details.
Acknowledgements
-
Marco K.