CVE-2025-14577
Plain English Summary
AI-powered analysis for quick understanding
An attacker can remotely run any PHP commands on Slican NCP/IPL/IPM/IPU devices without needing to log in, simply by sending specially crafted requests to a specific endpoint. This critical vulnerability can be exploited by anyone on the internet, making it crucial to update to the latest firmware versions to protect against this risk.
Technical Description
Slican NCP/IPL/IPM/IPU devices are vulnerable to PHP Function Injection. An unauthenticated remote attacker is able to execute arbitrary PHP commands by sending specially crafted requests to /webcti/session_ajax.php endpoint. This issue was fixed in version 1.24.0190 (Slican NCP) and 6.61.0010 (Slican IPL/IPM/IPU).
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 24, 2026
about 1 month ago
Last Modified
Mar 2, 2026
about 1 month ago
Vendor
slican
Product
ncp firmware