This vulnerability involves command injection in tcpdump within Moxa products, enabling an authenticated attacker with console access to exploit improper input validation to inject and execute systems commands. Successful exploitation could result in privilege escalation, allowing the attacker to gain root shell access and maintain persistent control over the device, potentially disrupting network services and affecting the availability of downstream systems that rely on its connectivity.
History

Wed, 02 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 02 Apr 2025 06:45:00 +0000

Type Values Removed Values Added
Description This vulnerability involves command injection in tcpdump within Moxa products, enabling an authenticated attacker with console access to exploit improper input validation to inject and execute systems commands. Successful exploitation could result in privilege escalation, allowing the attacker to gain root shell access and maintain persistent control over the device, potentially disrupting network services and affecting the availability of downstream systems that rely on its connectivity.
Title Commend Injection Leading to Privilege Escalation
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Moxa

Published: 2025-04-02T06:32:27.898Z

Updated: 2025-04-03T03:25:39.962Z

Reserved: 2025-01-23T15:47:52.112Z

Link: CVE-2025-0676

cve-icon Vulnrichment

Updated: 2025-04-02T16:22:20.377Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-04-02T07:15:41.903

Modified: 2025-04-02T14:58:07.527

Link: CVE-2025-0676

cve-icon Redhat

No data.