CVE-2025-20188
CRITICAL EXPLOITED NUCLEICisco IOS XE - Unauthenticated RCE
Title source: llmDescription
A vulnerability in the Out-of-Band Access Point (AP) Image Download, the Clean Air Spectral Recording, and the client debug bundles features of Cisco IOS XE Software for Wireless LAN Controllers (WLCs) could allow an unauthenticated, remote attacker to upload arbitrary files to an affected system. This vulnerability is due to the presence of a hard-coded JSON Web Token (JWT) on an affected system. An attacker could exploit this vulnerability by sending crafted HTTPS requests to the AP file upload interface. A successful exploit could allow the attacker to upload files, perform path traversal, and execute arbitrary commands with root privileges.
Exploits (1)
github
WORKING POC
40 stars
by iSee857 · pythonpoc
https://github.com/iSee857/CVE-PoC/tree/main/CiscoIOSXEWLC-CVE-2025-20188-uploadToRce.py
Nuclei Templates (1)
Cisco IOS XE WLC - Arbitrary File Upload
CRITICALVERIFIEDby iamnoooob,pdresearch,DhiyaneshDK
Shodan:
http.html_hash:1076109428 ssl.cert.issuer.cn:"IOS-Self-Signed-Certificate" port:8443
FOFA:
"IOS-Self-Signed-Certificate" && port="8443"
References (2)
Scores
CVSS v3
10.0
EPSS
0.0392
EPSS Percentile
88.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Details
VulnCheck KEV
2025-06-10
CWE
CWE-798
Status
published
Products (7)
cisco/ios_xe
17.11.1
cisco/ios_xe
17.11.99sw
cisco/ios_xe
17.12.1
cisco/ios_xe
17.12.2
cisco/ios_xe
17.12.3
cisco/ios_xe
17.13.1
cisco/ios_xe
17.14.1
Published
May 07, 2025
Tracked Since
Feb 18, 2026