Remote Code Execution Vulnerability in Modbus TCP Communication for Industrial Automation Systems
CVE-2025-48466

8.1HIGH

Key Information:

Vendor

Advantech

Vendor
CVE Published:
24 June 2025

Badges

👾 Exploit Exists🟡 Public PoC📰 News Worthy

What is CVE-2025-48466?

CVE-2025-48466 is a critical vulnerability found in Modbus TCP communication used in industrial automation systems, specifically attributed to Advantech's products. This vulnerability allows an unauthenticated remote attacker to send specially crafted Modbus TCP packets. By exploiting this flaw, attackers can manipulate Digital Outputs, potentially gaining unauthorized control over relay channels used in various industrial applications. Such manipulation could lead to severe operational disruptions and safety hazards, given the critical roles these systems play in controlling industrial processes and machinery.

Potential impact of CVE-2025-48466

  1. Operational Disruption: Exploitation of this vulnerability can lead to unauthorized manipulation of industrial equipment, causing operational downtime or failure, which can severely impact production schedules and operational efficiency.

  2. Safety Risks: Given the nature of industrial automation systems, unauthorized control over relay outputs could compromise safety protocols, potentially leading to catastrophic failures, injuries, or damage to infrastructure.

  3. Remote Access Threats: Since the vulnerability allows for unauthenticated access, it increases the risk of attackers gaining a foothold in critical infrastructures, which may facilitate further exploit attempts or allow for lateral movement within networks.

Affected Version(s)

Advantech Wireless Sensing and Equipment (WISE) A2.01 B00

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

Multiple Vulnerabilities in Advantech Products

Advantech has released security updates and mitigation measures addressing multiple vulnerabilities in their products. Users and administrators of affected...

3 weeks ago

References

CVSS V3.1

Score:
8.1
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 📰

    First article discovered by Cyber Security Agency of Singapore

  • Vulnerability published

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability Reserved

Credit

Jay Turla
Japz Divino
Jerold Camacho
.