This vulnerability involves command injection in tcpdump within Moxa products, enabling an authenticated attacker with console access to exploit improper input validation to inject and execute systems commands. Successful exploitation could result in privilege escalation, allowing the attacker to gain root shell access and maintain persistent control over the device, potentially disrupting network services and affecting the availability of downstream systems that rely on its connectivity.
Metrics
Affected Vendors & Products
References
History
Wed, 02 Apr 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 02 Apr 2025 06:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | This vulnerability involves command injection in tcpdump within Moxa products, enabling an authenticated attacker with console access to exploit improper input validation to inject and execute systems commands. Successful exploitation could result in privilege escalation, allowing the attacker to gain root shell access and maintain persistent control over the device, potentially disrupting network services and affecting the availability of downstream systems that rely on its connectivity. | |
| Title | Commend Injection Leading to Privilege Escalation | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Moxa
Published: 2025-04-02T06:32:27.898Z
Updated: 2025-04-03T03:25:39.962Z
Reserved: 2025-01-23T15:47:52.112Z
Link: CVE-2025-0676
Updated: 2025-04-02T16:22:20.377Z
Status : Awaiting Analysis
Published: 2025-04-02T07:15:41.903
Modified: 2025-04-02T14:58:07.527
Link: CVE-2025-0676
No data.