Логотип exploitDog
bind:CVE-2025-6949
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-6949

Количество 3

Количество 3

nvd логотип

CVE-2025-6949

6 месяцев назад

An Execution with Unnecessary Privileges vulnerability has been identified in Moxa’s network security appliances and routers. A critical authorization flaw in the API allows an authenticated, low-privileged user to create a new administrator account, including accounts with usernames identical to existing users. In certain scenarios, this vulnerability could allow an attacker to gain full administrative control over the affected device, leading to potential account impersonation. While successful exploitation can severely impact the confidentiality, integrity, and availability of the affected device itself, there is no loss of confidentiality or integrity within any subsequent systems.

EPSS: Низкий
github логотип

GHSA-xqwv-wj6g-m73m

6 месяцев назад

An Execution with Unnecessary Privileges vulnerability has been identified in Moxa’s network security appliances and routers. A critical authorization flaw in the API allows an authenticated, low-privileged user to create a new administrator account, including accounts with usernames identical to existing users. In certain scenarios, this vulnerability could allow an attacker to gain full administrative control over the affected device, leading to potential account impersonation. While successful exploitation can severely impact the confidentiality, integrity, and availability of the affected device itself, there is no loss of confidentiality or integrity within any subsequent systems.

EPSS: Низкий
fstec логотип

BDU:2025-13185

6 месяцев назад

Уязвимость микропрограммного обеспечения сетевых устройств Moxa, связанная с ошибками при управлении привилегиями, позволяющая нарушителю получить полный контроль над устройством

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-6949

An Execution with Unnecessary Privileges vulnerability has been identified in Moxa’s network security appliances and routers. A critical authorization flaw in the API allows an authenticated, low-privileged user to create a new administrator account, including accounts with usernames identical to existing users. In certain scenarios, this vulnerability could allow an attacker to gain full administrative control over the affected device, leading to potential account impersonation. While successful exploitation can severely impact the confidentiality, integrity, and availability of the affected device itself, there is no loss of confidentiality or integrity within any subsequent systems.

0%
Низкий
6 месяцев назад
github логотип
GHSA-xqwv-wj6g-m73m

An Execution with Unnecessary Privileges vulnerability has been identified in Moxa’s network security appliances and routers. A critical authorization flaw in the API allows an authenticated, low-privileged user to create a new administrator account, including accounts with usernames identical to existing users. In certain scenarios, this vulnerability could allow an attacker to gain full administrative control over the affected device, leading to potential account impersonation. While successful exploitation can severely impact the confidentiality, integrity, and availability of the affected device itself, there is no loss of confidentiality or integrity within any subsequent systems.

0%
Низкий
6 месяцев назад
fstec логотип
BDU:2025-13185

Уязвимость микропрограммного обеспечения сетевых устройств Moxa, связанная с ошибками при управлении привилегиями, позволяющая нарушителю получить полный контроль над устройством

CVSS3: 8.8
0%
Низкий
6 месяцев назад

Уязвимостей на страницу