7.2
CVE-2025-41688
- EPSS 0.16%
- Published 31.07.2025 10:15:26
- Last modified 31.07.2025 18:42:37
- Source info@cert.vde.com
- Teams watchlist Login
- Open Login
A high privileged remote attacker can execute arbitrary OS commands using an undocumented method allowing to escape the implemented LUA sandbox.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorMB connect line
≫
Product
mbNET HW1
Default Statusunaffected
Version <=
5.1.11
Version
0.0.0
Status
affected
VendorMB connect line
≫
Product
mbNET/mbNET.rokey
Default Statusunaffected
Version <
7.3.0
Version
0.0.0
Status
affected
VendorHelmholz
≫
Product
REX 300
Default Statusunaffected
Version <=
5.1.11
Version
0.0.0
Status
affected
VendorHelmholz
≫
Product
REX 200/250
Default Statusunaffected
Version <
7.3.0
Version
0.0.0
Status
affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.16% | 0.369 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
info@cert.vde.com | 7.2 | 1.2 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
CWE-653 Improper Isolation or Compartmentalization
The product does not properly compartmentalize or isolate functionality, processes, or resources that require different privilege levels, rights, or permissions.