Home

Description

The Meteobridge web interface let meteobridge administrator manage their weather station data collection and administer their meteobridge system through a web application written in CGI shell scripts and C. This web interface exposes an endpoint that is vulnerable to command injection. Remote unauthenticated attackers can gain arbitrary command execution with elevated privileges ( root ) on affected devices.

PUBLISHED Reserved 2025-04-27 | Published 2025-05-21 | Updated 2025-10-21 | Assigner ONEKEY




HIGH: 8.7CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

CISA Known Exploited Vulnerability

Date added 2025-10-02 | Due date 2025-10-23

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Problem types

CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')

CWE-306 Missing Authentication for Critical Function

Product status

Default status
unaffected

Any version
affected

Timeline

2025-02-25:Notification email sent to info@smartbedded.com
2025-03-18:Notification email sent to info@smartbedded.com
2025-04-10:Notification email sent to info@smartbedded.com
2025-04-15:Notification email sent to info@smartbedded.com
2025-04-10:ONEKEY posts a message on MeteoBridge support forum
2025-04-11:MeteoBridge support forum administrator delets the forum post and account.
2025-04-27:ONEKEY notifies the German BSI
2025-05-14:Smartbedded notifies the German BSI of a patch being available (version 6.2)
2025-05-21:CVE publication

Credits

ONEKEY Research Labs finder

References

www.cisa.gov/...nerabilities-catalog?field_cve=CVE-2025-4008 government-resource

www.onekey.com/...n-on-smartbedded-meteobridge-cve-2025-4008 third-party-advisory

forum.meteohub.de/viewtopic.php?t=18687 vendor-advisory

cve.org (CVE-2025-4008)

nvd.nist.gov (CVE-2025-4008)

Download JSON