Infoblox NETMRI - RCE (CVE-2025-32813)
39Exploiting IPs reported
An issue was discovered in Infoblox NETMRI before 7.6.1. Remote Unauthenticated Command Injection can occur.
CrowdSec analysis
CVE-2025-32813 is a command injection vulnerability in Infoblox NETMRI versions prior to 7.6.1, which allows remote attackers to execute arbitrary commands on the affected system without authentication. This flaw could be exploited to gain unauthorized control, potentially leading to data compromise, system manipulation, or service disruption.
CrowdSec has been tracking this vulnerability and its exploits since 24th of July 2025.
CrowdSec network observations suggest that most exploitation of CVE-2025-32813 involves focused reconnaissance to identify viable targets. Attackers typically tailor their campaigns based on system exposure and configuration. It is unlikely that a given attack is accidental. CrowdSec data also reveals a clear uptick in attacks involving CVE-2025-32813 over the past week. Activity is above the usual baseline, suggesting growing attention from attackers. This may reflect rising awareness, recent exploit releases, or expanded targeting efforts.
Attackers exploit the /webui/application/get_saml_request
endpoint by injecting shell metacharacters into the saml_id
parameter, enabling unauthenticated remote command execution on vulnerable Infoblox NetMRI systems.
Exploitation
Get real-time information about exploitation attempts and actors involved.
Protection
Find out relevant information to protect your stack against this CVE.
Blocklist
With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.
To increase your protection against this CVE, block exploitation attempts with this list of identified actors.