Unauthenticated Remote Code Execution in Affected Device's Main Web Interface by Vendor
CVE-2025-41684

8.8HIGH

What is CVE-2025-41684?

An authenticated remote attacker could exploit the vulnerability present in the affected device's Main Web Interface. The flaw arises from insufficient sanitization of user input at the tls_iotgen_setting endpoint, allowing the attacker to execute arbitrary commands with root privileges. This could potentially lead to unauthorized access and manipulation of the device, emphasizing the necessity for vendors to implement robust input validation to safeguard against such exploits.

Affected Version(s)

IE-SR-2TX-WL V0.0

IE-SR-2TX-WL-4G-EU V0.0

IE-SR-2TX-WL-4G-US-V V0.0

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Reid Wightman of Dragos Inc.
.
CVE-2025-41684 : Unauthenticated Remote Code Execution in Affected Device's Main Web Interface by Vendor