CVE-2025-9974
Insufficient Input Validation on WEBUI in Nokia ONT/Beacon product

Public disclosure

02-02-2026

Last updated

02-02-2026

Vulnerability type

Authenticated OS command injection

CVSS vector

CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS score

8.0

Description

The unified WEBUI application of the ONT/Beacon device contains an input handling flaw that allows authenticated users to trigger unintended system-level command execution. Due to insufficient validation of user-supplied data, a low-privileged authenticated attacker may be able to execute arbitrary commands on the underlying ONT/Beacon operating system, potentially impacting the confidentiality, integrity, and availability of the device.

Affected products and versions

Product

Versions

Beacon 1.1, Beacon 2, Beacon 6, Beacon 10, Beacon 19, Beacon 24, Beacon 3.2, Beacon G3.1, Beacon G6, Beacon 3.1, G-010G-D, G-1426G-A, G-1426G-C, G-1426G-D, G-1426G-E, G-240G-H, XS-2426G-B, XS-2426X-A, XS-220X-A, XS-140X-A, XS-1426X-A, XS-2437X-B, U-040X-A

All supported releases prior to BBDR2503

Mitigation plan

The fix has been delivered in BBDR2503 and later releases. Please contact Nokia support for details.

Acknowledgements

  • Marco K. 

References