CVE-2025-11571
Command Execution vulnerability in Simplicity Installer
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
Vulnerable endpoints accept user-controlled input through a URL in JSON format which enables command execution. The commands allowed to execute can open executables. However, the commands cannot pass parameters or arguments.ย To successfully execute this attack, the attacker needs to be on the same network.
| CWE | CWE-78 |
| Vendor | silabs.com |
| Product | simplicity studio v5 |
| Published | Mar 24, 2026 |
| Last Updated | Mar 24, 2026 |
Stay Ahead of the Next One
Get instant alerts for silabs.com simplicity studio v5
Be the first to know when new unknown vulnerabilities affecting silabs.com simplicity studio v5 are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
silabs.com / Simplicity Studio v5
0 โค 5.11.2.1
silabs.com / Simplicity Installer tool (Silicon Labs Tool - SLT) for Simplicity Studio v6
0 โค 1.0.1