Command Injection Vulnerability in Moxa Products
CVE-2025-0676

8.6HIGH

Key Information:

Vendor
Moxa
Vendor
CVE Published:
2 April 2025

What is CVE-2025-0676?

CVE-2025-0676 is a command injection vulnerability found in Moxa products, which are widely used for industrial networking and automation. This vulnerability allows an authenticated user with console access to exploit weaknesses in input validation, enabling them to inject and execute arbitrary system commands. The implications of this vulnerability are significant, as it could allow attackers to gain root shell access to the device, potentially leading to extensive disruptions in network services and the operational integrity of connected systems that depend on Moxa devices for their connectivity.

Technical Details

The vulnerability manifests within the tcpdump utility used in Moxa products. It stems from improper handling of user inputs, which could be exploited by attackers with valid console access. By leveraging this flaw, an attacker can execute system commands with elevated privileges, resulting in privilege escalation. Such exploitation highlights critical weaknesses in security protocols within the affected products, necessitating urgent attention from organizations utilizing these systems.

Potential impact of CVE-2025-0676

  1. Privilege Escalation: The primary concern is the potential for an attacker to gain root access, which would allow them to perform any operation on the device, undermining the integrity and confidentiality of the system.

  2. Service Disruption: Once control is gained, an attacker can disrupt network services, impacting the business continuity of operations that rely on the Moxa devices for communication and data transfer.

  3. Compromise of Connected Systems: The exploitation of this vulnerability could have cascading effects, jeopardizing the availability and security of other systems that are connected to the vulnerable Moxa products, potentially leading to a wider network breach.

Affected Version(s)

EDF-G1002-BP Series 1.0 <= 3.14

EDR-8010 Series 1.0 <= 3.14

EDR-810 Series 1.0 <= 5.12.39

References

CVSS V4

Score:
8.6
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Rex Weng from Moxa's Product Security Center
.