6.2
CVE-2025-41762
- EPSS 0.01%
- Veröffentlicht 09.03.2026 08:17:27
- Zuletzt bearbeitet 11.03.2026 18:27:23
- Quelle info@cert.vde.com
- CVE-Watchlists
- Unerledigt
An unauthenticated attacker can abuse the weak hash of the backup generated by the wwwdnload.cgi endpoint to gain unauthorized access to sensitive data, including password hashes and certificates.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Mbs-solutions ≫ Universal Bacnet Router Firmware Version < 6.0.1.0
Mbs-solutions ≫ Ubr-01 Mk Ii Version-
Mbs-solutions ≫ Ubr-02 Version-
Mbs-solutions ≫ Ubr-lon Version-
Mbs-solutions ≫ Ubr-02 Version-
Mbs-solutions ≫ Ubr-lon Version-
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.01% | 0.004 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| info@cert.vde.com | 6.2 | 2.5 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
CWE-328 Use of Weak Hash
The product uses an algorithm that produces a digest (output value) that does not meet security expectations for a hash function that allows an adversary to reasonably determine the original input (preimage attack), find another input that can produce the same hash (2nd preimage attack), or find multiple inputs that evaluate to the same hash (birthday attack).