CVE-2025-9974
Insufficient Input Validation on WEBUI in Nokia ONT/Beacon product
Public disclosure |
02-02-2026 |
|---|---|
Last updated |
02-02-2026 |
Vulnerability type |
Authenticated OS command injection |
CVSS vector |
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVSS score |
8.0 |
Description
The unified WEBUI application of the ONT/Beacon device contains an input handling flaw that allows authenticated users to trigger unintended system-level command execution. Due to insufficient validation of user-supplied data, a low-privileged authenticated attacker may be able to execute arbitrary commands on the underlying ONT/Beacon operating system, potentially impacting the confidentiality, integrity, and availability of the device.
Affected products and versions
Product |
Versions |
|---|---|
Beacon 1.1, Beacon 2, Beacon 6, Beacon 10, Beacon 19, Beacon 24, Beacon 3.2, Beacon G3.1, Beacon G6, Beacon 3.1, G-010G-D, G-1426G-A, G-1426G-C, G-1426G-D, G-1426G-E, G-240G-H, XS-2426G-B, XS-2426X-A, XS-220X-A, XS-140X-A, XS-1426X-A, XS-2437X-B, U-040X-A |
All supported releases prior to BBDR2503 |
Mitigation plan
The fix has been delivered in BBDR2503 and later releases. Please contact Nokia support for details.
Acknowledgements
-
Marco K.