7.8
CVE-2025-41761
- EPSS 0.01%
- Veröffentlicht 09.03.2026 08:17:11
- Zuletzt bearbeitet 11.03.2026 18:27:21
- Quelle info@cert.vde.com
- CVE-Watchlists
- Unerledigt
A low‑privileged local attacker who gains access to the UBR service account (e.g., via SSH) can escalate privileges to obtain full system access. This is due to the service account being permitted to execute certain binaries (e.g., tcpdump and ip) with sudo.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Mbs-solutions ≫ Universal Bacnet Router Firmware Version < 6.0.1.0
Mbs-solutions ≫ Ubr-01 Mk Ii Version-
Mbs-solutions ≫ Ubr-02 Version-
Mbs-solutions ≫ Ubr-lon Version-
Mbs-solutions ≫ Ubr-02 Version-
Mbs-solutions ≫ Ubr-lon Version-
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.01% | 0.014 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| info@cert.vde.com | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-88 Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
The product constructs a string for a command to be executed by a separate component in another control sphere, but it does not properly delimit the intended arguments, options, or switches within that command string.