Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2025-59707

In N2W before 4.3.2 and 4.4.x before 4.4.1, there is potential remote code execution and account credentials theft because of a spoofing vulnerability.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 53.8%
CVSS Severity
CVSS v3 Score 9.8
Products affected by CVE-2025-59707
  • N2ws » N2w » Version: 2.1.1
    cpe:2.3:a:n2ws:n2w:2.1.1
  • N2ws » N2w » Version: 2.1.2
    cpe:2.3:a:n2ws:n2w:2.1.2
  • N2ws » N2w » Version: 2.1.3
    cpe:2.3:a:n2ws:n2w:2.1.3
  • N2ws » N2w » Version: 2.1.3a
    cpe:2.3:a:n2ws:n2w:2.1.3a
  • N2ws » N2w » Version: 2.1.3b
    cpe:2.3:a:n2ws:n2w:2.1.3b
  • N2ws » N2w » Version: 2.1.3c
    cpe:2.3:a:n2ws:n2w:2.1.3c
  • N2ws » N2w » Version: 2.2.0
    cpe:2.3:a:n2ws:n2w:2.2.0
  • N2ws » N2w » Version: 2.2.0a
    cpe:2.3:a:n2ws:n2w:2.2.0a
  • N2ws » N2w » Version: 2.3.0a
    cpe:2.3:a:n2ws:n2w:2.3.0a
  • N2ws » N2w » Version: 2.3.0b
    cpe:2.3:a:n2ws:n2w:2.3.0b
  • N2ws » N2w » Version: 2.3.0c
    cpe:2.3:a:n2ws:n2w:2.3.0c
  • N2ws » N2w » Version: 2.3.0d
    cpe:2.3:a:n2ws:n2w:2.3.0d
  • N2ws » N2w » Version: 2.3.0e
    cpe:2.3:a:n2ws:n2w:2.3.0e
  • N2ws » N2w » Version: 2.4.0
    cpe:2.3:a:n2ws:n2w:2.4.0
  • N2ws » N2w » Version: 2.5.0
    cpe:2.3:a:n2ws:n2w:2.5.0
  • N2ws » N2w » Version: 2.5.1
    cpe:2.3:a:n2ws:n2w:2.5.1
  • N2ws » N2w » Version: 2.5.1a
    cpe:2.3:a:n2ws:n2w:2.5.1a
  • N2ws » N2w » Version: 2.6.0
    cpe:2.3:a:n2ws:n2w:2.6.0
  • N2ws » N2w » Version: 2.6.0a
    cpe:2.3:a:n2ws:n2w:2.6.0a
  • N2ws » N2w » Version: 2.6.0b
    cpe:2.3:a:n2ws:n2w:2.6.0b
  • N2ws » N2w » Version: 2.7.0
    cpe:2.3:a:n2ws:n2w:2.7.0
  • N2ws » N2w » Version: 2.7.0a
    cpe:2.3:a:n2ws:n2w:2.7.0a
  • N2ws » N2w » Version: 3.1.0
    cpe:2.3:a:n2ws:n2w:3.1.0
  • N2ws » N2w » Version: 3.1.0a
    cpe:2.3:a:n2ws:n2w:3.1.0a
  • N2ws » N2w » Version: 3.1.0b
    cpe:2.3:a:n2ws:n2w:3.1.0b
  • N2ws » N2w » Version: 3.2.0
    cpe:2.3:a:n2ws:n2w:3.2.0
  • N2ws » N2w » Version: 3.2.1
    cpe:2.3:a:n2ws:n2w:3.2.1
  • N2ws » N2w » Version: 4.0.0
    cpe:2.3:a:n2ws:n2w:4.0.0
  • N2ws » N2w » Version: 4.0.0a
    cpe:2.3:a:n2ws:n2w:4.0.0a
  • N2ws » N2w » Version: 4.0.0b
    cpe:2.3:a:n2ws:n2w:4.0.0b
  • N2ws » N2w » Version: 4.0.0c
    cpe:2.3:a:n2ws:n2w:4.0.0c
  • N2ws » N2w » Version: 4.1.0
    cpe:2.3:a:n2ws:n2w:4.1.0
  • N2ws » N2w » Version: 4.1.1a
    cpe:2.3:a:n2ws:n2w:4.1.1a
  • N2ws » N2w » Version: 4.2.0
    cpe:2.3:a:n2ws:n2w:4.2.0
  • N2ws » N2w » Version: 4.2.1
    cpe:2.3:a:n2ws:n2w:4.2.1
  • N2ws » N2w » Version: 4.2.2
    cpe:2.3:a:n2ws:n2w:4.2.2
  • N2ws » N2w » Version: 4.3.0
    cpe:2.3:a:n2ws:n2w:4.3.0
  • N2ws » N2w » Version: 4.3.1
    cpe:2.3:a:n2ws:n2w:4.3.1
  • N2ws » N2w » Version: 4.4.0
    cpe:2.3:a:n2ws:n2w:4.4.0


Contact Us

Shodan ® - All rights reserved