Логотип exploitDog
bind:CVE-2025-6893
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-6893

Количество 3

Количество 3

nvd логотип

CVE-2025-6893

4 месяца назад

An Execution with Unnecessary Privileges vulnerability has been identified in Moxa’s network security appliances and routers. A flaw in broken access control has been identified in the /api/v1/setting/data endpoint of the affected device. This flaw allows a low-privileged authenticated user to call the API without the required permissions, thereby gaining the ability to access or modify system configuration data. Successful exploitation may lead to privilege escalation, allowing the attacker to access or modify sensitive system settings. While the overall impact is high, there is no loss of confidentiality or integrity within any subsequent systems.

EPSS: Низкий
github логотип

GHSA-78fm-6p6r-4vxr

4 месяца назад

An Execution with Unnecessary Privileges vulnerability has been identified in Moxa’s network security appliances and routers. A flaw in broken access control has been identified in the /api/v1/setting/data endpoint of the affected device. This flaw allows a low-privileged authenticated user to call the API without the required permissions, thereby gaining the ability to access or modify system configuration data. Successful exploitation may lead to privilege escalation, allowing the attacker to access or modify sensitive system settings. While the overall impact is high, there is no loss of confidentiality or integrity within any subsequent systems.

EPSS: Низкий
fstec логотип

BDU:2025-13186

4 месяца назад

Уязвимость микропрограммного обеспечения сетевых устройств Moxa, связанная с ошибками при управлении привилегиями, позволяющая нарушителю повысить свои привилегии

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-6893

An Execution with Unnecessary Privileges vulnerability has been identified in Moxa’s network security appliances and routers. A flaw in broken access control has been identified in the /api/v1/setting/data endpoint of the affected device. This flaw allows a low-privileged authenticated user to call the API without the required permissions, thereby gaining the ability to access or modify system configuration data. Successful exploitation may lead to privilege escalation, allowing the attacker to access or modify sensitive system settings. While the overall impact is high, there is no loss of confidentiality or integrity within any subsequent systems.

0%
Низкий
4 месяца назад
github логотип
GHSA-78fm-6p6r-4vxr

An Execution with Unnecessary Privileges vulnerability has been identified in Moxa’s network security appliances and routers. A flaw in broken access control has been identified in the /api/v1/setting/data endpoint of the affected device. This flaw allows a low-privileged authenticated user to call the API without the required permissions, thereby gaining the ability to access or modify system configuration data. Successful exploitation may lead to privilege escalation, allowing the attacker to access or modify sensitive system settings. While the overall impact is high, there is no loss of confidentiality or integrity within any subsequent systems.

0%
Низкий
4 месяца назад
fstec логотип
BDU:2025-13186

Уязвимость микропрограммного обеспечения сетевых устройств Moxa, связанная с ошибками при управлении привилегиями, позволяющая нарушителю повысить свои привилегии

CVSS3: 8.8
0%
Низкий
4 месяца назад

Уязвимостей на страницу