CVE-2025-20188

CRITICAL EXPLOITED NUCLEI

Cisco IOS XE - Unauthenticated RCE

Title source: llm

Description

A vulnerability in the Out-of-Band Access Point (AP) Image Download, the Clean Air Spectral Recording, and the client debug bundles features of Cisco IOS XE Software for Wireless LAN Controllers (WLCs) could allow an unauthenticated, remote attacker to upload arbitrary files to an affected system. This vulnerability is due to the presence of a hard-coded JSON Web Token (JWT) on an affected system. An attacker could exploit this vulnerability by sending crafted HTTPS requests to the AP file upload interface. A successful exploit could allow the attacker to upload files, perform path traversal, and execute arbitrary commands with root privileges.

Exploits (1)

github WORKING POC 40 stars
by iSee857 · pythonpoc
https://github.com/iSee857/CVE-PoC/tree/main/CiscoIOSXEWLC-CVE-2025-20188-uploadToRce.py

Nuclei Templates (1)

Cisco IOS XE WLC - Arbitrary File Upload
CRITICALVERIFIEDby iamnoooob,pdresearch,DhiyaneshDK
Shodan: http.html_hash:1076109428 ssl.cert.issuer.cn:"IOS-Self-Signed-Certificate" port:8443
FOFA: "IOS-Self-Signed-Certificate" && port="8443"

Scores

CVSS v3 10.0
EPSS 0.0392
EPSS Percentile 88.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Details

VulnCheck KEV 2025-06-10
CWE
CWE-798
Status published
Products (7)
cisco/ios_xe 17.11.1
cisco/ios_xe 17.11.99sw
cisco/ios_xe 17.12.1
cisco/ios_xe 17.12.2
cisco/ios_xe 17.12.3
cisco/ios_xe 17.13.1
cisco/ios_xe 17.14.1
Published May 07, 2025
Tracked Since Feb 18, 2026