VYPR
Medium severityNVD Advisory· Published May 23, 2025· Updated Apr 15, 2026

CVE-2025-41379

CVE-2025-41379

Description

The Intellian C700 web panel allows you to add firewall rules. Each of these rules has an associated ID, but there is a problem when adding a new rule, the ID used to create the database entry may be different from the JSON ID. If the rule needs to be deleted later, the system will use the JSON ID and therefore fail. This can be exploited by an attacker to create rules that cannot be deleted unless the device is reset to factory defaults.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An ID mismatch in firewall rule management on the Intellian C700 web panel allows attackers to create permanent rules that block legitimate communications until a factory reset.

Issue

The Intellian C700 web panel (part of the Iridium Certus 700 maritime satellite terminal) provides a mechanism for authorised users to add firewall rules. A logic flaw arises when a new rule is added: the identifier used to store the rule in the internal database may differ from the identifier present in the JSON payload returned to the web interface. This inconsistency means that when an administrator later attempts to delete a rule, the deletion operation references the JSON ID, which does not match the database ID, causing the deletion to fail. [1]

Exploitation

An authenticated attacker with low-privilege access to the web panel can exploit this by creating carefully crafted firewall rules. Because the rule creation succeeds (the rule is stored in the database) but the subsequent deletion based on the JSON ID always fails, the attacker can generate rules that are effectively permanent. The only way to remove such orphaned rules is to reset the device to factory defaults. No special network position is required beyond being able to reach the web panel. [1]

Impact

The inability to delete firewall rules can be used to block critical satellite communications, disrupt legitimate administrative actions, or lock the device into an undesirable configuration. While the vulnerability itself does not directly disclose data or execute code (CVSS v4.0 6.3, AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:N), the availability impact is significant because the attacker can enforce a denial-of-service condition on the device's firewall management until a factory reset is performed. [1]

Mitigation

Intellian Technologies has resolved this vulnerability in their Q2 2025 software release. Users of the Iridium Certus 700 (version 1.0.1 or earlier) should apply the latest firmware update provided by the vendor. No workaround other than a factory reset is available for devices already affected. [1]

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.