A non-primary administrator user with admin rights to the web interface but without shell access permissions can display configuration of the device including the master admin password. This vulnerability also allows the user to give themselves shell access with the root gid.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.tenable.com/security/research/tra-2025-25 |
![]() ![]() |
History
Wed, 27 Aug 2025 11:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Racom
Racom m!dge |
|
Vendors & Products |
Racom
Racom m!dge |
Tue, 26 Aug 2025 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A non-primary administrator user with admin rights to the web interface but without shell access permissions can display configuration of the device including the master admin password. This vulnerability also allows the user to give themselves shell access with the root gid. | |
Title | RACOM M!DGE2 Privilege Escalation via SDK Testing Endpoint | |
Weaknesses | CWE-269 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: tenable
Published: 2025-08-26T16:26:08.624Z
Updated: 2025-08-26T16:26:08.624Z
Reserved: 2025-04-15T21:53:52.386Z
Link: CVE-2025-36729

No data.

Status : Received
Published: 2025-08-26T17:15:37.580
Modified: 2025-08-26T17:15:37.580
Link: CVE-2025-36729

No data.