10
CVSSv3

CVE-2025-20188

CVSSv4: NA | CVSSv3: 10 | CVSSv2: NA | VMScore: 1000 | EPSS: 0.00202 | KEV: Not Included
Published: 07/05/2025 Updated: 08/05/2025

Vulnerability Summary

Cisco IOS XE WLC Unauthenticated Remote Code Execution via JWT Vulnerability

A vulnerability exists in Cisco IOS XE Software for Wireless LAN Controllers (WLCs) related to the Out-of-Band Access Point (AP) Image Download feature. An unauthenticated, remote attacker could potentially upload arbitrary files to an affected system due to a hard-coded JSON Web Token (JWT). By sending crafted HTTPS requests to the AP image download interface, an attacker might upload files, conduct path traversal, and execute arbitrary commands with root privileges. However, this vulnerability requires the Out-of-Band AP Image Download feature to be enabled on the device, which is not the default configuration.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco cisco ios xe software

Github Repositories

Recent Articles

Cisco fixes max severity IOS XE flaw letting attackers hijack devices
BleepingComputer • Bill Toulas • 08 May 2025

Cisco fixes max severity IOS XE flaw letting attackers hijack devices By Bill Toulas May 8, 2025 04:53 PM 0 Cisco has fixed a maximum severity flaw in IOS XE Software for Wireless LAN Controllers by a hard-coded JSON Web Token (JWT) that allows an unauthenticated remote attacker to take over devices. This token is meant to authenticate requests to a feature called 'Out-of-Band AP Image Download.' Since it's hard-coded, anyone can impersonate an authorized user without credentials. The vulne...