Command injection vulnerability exists in the “Logging” page of the web-based configuration utility. An authenticated user with low privileged network access for the configuration utility can execute arbitrary commands on the underlying OS to obtain root SSH access to the TropOS 4th Gen device.
History

Wed, 29 Oct 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Hitachienergy
Hitachienergy tropos
Vendors & Products Hitachienergy
Hitachienergy tropos

Tue, 28 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 28 Oct 2025 12:30:00 +0000

Type Values Removed Values Added
Description Command injection vulnerability exists in the “Logging” page of the web-based configuration utility. An authenticated user with low privileged network access for the configuration utility can execute arbitrary commands on the underlying OS to obtain root SSH access to the TropOS 4th Gen device.
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Hitachi Energy

Published: 2025-10-28T12:15:29.573Z

Updated: 2025-10-28T13:14:18.210Z

Reserved: 2025-02-04T16:13:15.117Z

Link: CVE-2025-1036

cve-icon Vulnrichment

Updated: 2025-10-28T13:14:13.595Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-28T13:15:56.080

Modified: 2025-10-30T15:05:32.197

Link: CVE-2025-1036

cve-icon Redhat

No data.