CVE-2025-56009:CSRF vulnerability in KeeneticOS allows device takeover via unauthorized user addition.

splash
Back

Description Preview

A cross-site request forgery (CSRF) vulnerability has been identified in KeeneticOS versions prior to 4.3. The vulnerability is located at the "/rci" API endpoint and allows attackers to take control of the device by adding additional users with full permissions. This can be achieved by manipulating the victim into opening a page containing the exploit.

Overview

The vulnerability (CVE-2025-56009) in KeeneticOS affects versions before 4.3 and is classified as medium severity with a CVSS v3.1 base score of 5.3. It exploits a cross-site request forgery weakness (CWE-352) at the "/rci" API endpoint. Attackers can leverage this vulnerability to add unauthorized users with full permissions, effectively taking over the device. The attack vector is network-based, requires low attack complexity, and does not need privileges or user interaction. While the confidentiality impact is low, there is no direct impact on integrity or availability. The vulnerability was published on October 23, 2025, and affects the security of Keenetic devices.

Remediation

To mitigate this vulnerability, users should take the following actions:

  1. Update KeeneticOS to version 4.3 or later as soon as it becomes available.
  2. Implement strong CSRF protection measures on the "/rci" API endpoint.
  3. Regularly monitor and audit user accounts and permissions on Keenetic devices.
  4. Educate users about the risks of opening untrusted links or pages, especially when logged into the device's admin interface.
  5. Consider implementing additional security measures such as two-factor authentication for administrative actions.

References

[1] Keenetic. (n.d.). Official Website. https://keenetic.com/ [2] Keenetic. (2025, October). Web API Vulnerabilities - October 2025. https://keenetic.com/global/security#october-2025-web-api-vulnerabilities

Industry ExposureMost to least
This section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.

  1. Accommodation & Food Services: Low
    Accommodation & Food Services
  2. Administrative, Support, Waste Management & Remediation Services: Low
    Administrative, Support, Waste Management & Remediation Services
  3. Agriculture, Forestry Fishing & Hunting: Low
    Agriculture, Forestry Fishing & Hunting
  4. Arts, Entertainment & Recreation: Low
    Arts, Entertainment & Recreation
  5. Construction: Low
    Construction
  6. Educational Services: Low
    Educational Services
  7. Finance and Insurance: Low
    Finance and Insurance
  8. Health Care & Social Assistance: Low
    Health Care & Social Assistance
  9. Information: Low
    Information
  10. Management of Companies & Enterprises: Low
    Management of Companies & Enterprises
  11. Manufacturing: Low
    Manufacturing
  12. Mining: Low
    Mining
  13. Other Services (except Public Administration): Low
    Other Services (except Public Administration)
  14. Professional, Scientific, & Technical Services: Low
    Professional, Scientific, & Technical Services
  15. Public Administration: Low
    Public Administration
  16. Real Estate Rental & Leasing: Low
    Real Estate Rental & Leasing
  17. Retail Trade: Low
    Retail Trade
  18. Transportation & Warehousing: Low
    Transportation & Warehousing
  19. Utilities: Low
    Utilities
  20. Wholesale Trade: Low
    Wholesale Trade

Focus on What Matters

  1. See Everything.
  2. Identify True Risk.
  3. Proactively Mitigate Threats.

Let's talk!

background