Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Ubiquiti UniFi Devices Vulnerability Allows Attackers to Inject Malicious Commands

Posted on July 18, 2025July 18, 2025 By CWS

A important safety vulnerability affecting a number of Ubiquiti UniFi Entry gadgets might enable attackers to execute malicious instructions remotely. 

The vulnerability, tracked as CVE-2025-27212, stems from improper enter validation and has been assigned a most CVSS v3.0 base rating of 9.8, indicating a Essential Severity. 

Key Takeaways1. Essential flaw (CVE-2025-27212) permits attackers to inject instructions into UniFi Entry gadgets.2. Six gadget strains are affected, compromising bodily safety methods if exploited.3. Rapid firmware updates and community isolation are required.

Safety researchers Bongeun Koo and Junhyung Cho found the flaw, which impacts six completely different UniFi Entry product strains and poses vital dangers to enterprise safety infrastructure.

Ubiquiti UniFi Gadgets Injection Vulnerability

The safety flaw represents a command injection vulnerability that exploits improper enter validation mechanisms throughout the UniFi Entry administration community. 

In line with the official Safety advisory, the vulnerability permits malicious actors who’ve gained entry to the UniFi Entry administration community to inject and execute arbitrary instructions on affected gadgets.

The assault vector is especially regarding because it requires community entry (AV:N) with low assault complexity (AC:L) and no privileges required (PR:N), making it extremely exploitable.

The CVSS v3.0 vector string CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H signifies that profitable exploitation may end up in full compromise of confidentiality, integrity, and availability of the affected methods. 

This classification locations the vulnerability in essentially the most extreme class, requiring instant consideration from community directors and safety groups.

Danger FactorsDetailsAffected Merchandise– UniFi Entry Reader Professional (≤ 2.14.21)- UniFi Entry G2 Reader Professional (≤ 1.10.32)- UniFi Entry G3 Reader Professional (≤ 1.10.30)- UniFi Entry Intercom (≤ 1.7.28)- UniFi Entry G3 Intercom (≤ 1.7.29)- UniFi Entry Intercom Viewer (≤ 1.3.20)ImpactComplete system compromiseExploit Stipulations– Community entry to UniFi Entry administration network- No authentication required- No person interplay needed- Low assault complexityCVSS 3.1 Score9.8 (Essential )

Affected Merchandise 

The vulnerability impacts six distinct UniFi Entry product strains with particular firmware variations. UniFi Entry Reader Professional gadgets working model 2.14.21 and earlier are affected, together with UniFi Entry G2 Reader Professional (model 1.10.32 and earlier) and UniFi Entry G3 Reader Professional (model 1.10.30 and earlier). 

Moreover, intercom methods together with UniFi Entry Intercom (model 1.7.28 and earlier), UniFi Entry G3 Intercom (model 1.7.29 and earlier), and UniFi Entry Intercom Viewer (model 1.3.20 and earlier) are weak.

Organizations utilizing these gadgets of their bodily safety infrastructure face potential unauthorized entry to constructing administration methods, surveillance networks, and entry management mechanisms. 

The broad scope of affected merchandise means that quite a few enterprise environments could also be in danger. Ubiquiti has launched firmware updates to deal with the vulnerability throughout all affected product strains. 

Community directors ought to instantly replace UniFi Entry Reader Professional to model 2.15.9 or later, UniFi Entry G2 Reader Professional to model 1.11.23 or later, and UniFi Entry G3 Reader Professional to model 1.11.22 or later. 

For intercom methods, updates embrace UniFi Entry Intercom and UniFi Entry G3 Intercom to model 1.8.22 or later, and UniFi Entry Intercom Viewer to model 1.4.39 or later.

Organizations ought to prioritize these updates, given the important nature of the vulnerability, and implement community segmentation to restrict publicity of UniFi Entry administration networks till patches are utilized.

Increase detection, scale back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Strive ANY.RUN Now 

Cyber Security News Tags:Attackers, Commands, Devices, Inject, Malicious, Ubiquiti, UniFi, Vulnerability

Post navigation

Previous Post: Email Protection Startup StrongestLayer Emerges From Stealth Mode
Next Post: Sophos Intercept X for Windows Vulnerabilities Enable Arbitrary Code Execution

Related Posts

Chrome 0-day Vulnerability Exploited in the Wild to Execute Arbitrary Code Cyber Security News
Tycoon2FA Infra Used by Dadsec Hacker Group to Steal Office365 Credentials Cyber Security News
Chrome Vulnerabilities Let Attackers Execute Malicious Code Remotely Cyber Security News
Citrix Windows Virtual Delivery Agent Vulnerability Let Attackers Gain SYSTEM Privileges Cyber Security News
YONO SBI Banking App Vulnerability Let Attackers Execute a Man-in-the-Middle Attack Cyber Security News
Beware! Fake AI Video Generation Platforms Drop Stealer Malware on Your Computers Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Google Sued BadBox 2.0 Malware Botnet Operators That Infects 10 Million+ Devices
  • China’s Massistant Tool Secretly Extracts SMS, GPS Data, and Images From Confiscated Phones
  • UNG0002 Group Hits China, Hong Kong, Pakistan Using LNK Files and RATs in Twin Campaigns
  • New Wave of Crypto-Hijacking Infects 3,500+ Websites
  • Fancy Bear Hackers Attacking Governments, Military Entities With New Sophisticated Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Google Sued BadBox 2.0 Malware Botnet Operators That Infects 10 Million+ Devices
  • China’s Massistant Tool Secretly Extracts SMS, GPS Data, and Images From Confiscated Phones
  • UNG0002 Group Hits China, Hong Kong, Pakistan Using LNK Files and RATs in Twin Campaigns
  • New Wave of Crypto-Hijacking Infects 3,500+ Websites
  • Fancy Bear Hackers Attacking Governments, Military Entities With New Sophisticated Tools

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News