Description
The Meteobridge web interface let meteobridge administrator manage their weather station data collection and administer their meteobridge system through a web application written in CGI shell scripts and C. This web interface exposes an endpoint that is vulnerable to command injection. Remote unauthenticated attackers can gain arbitrary command execution with elevated privileges ( root ) on affected devices.
CISA Known Exploited Vulnerability
Date added 2025-10-02 | Due date 2025-10-23
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Problem types
CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE-306 Missing Authentication for Critical Function
Product status
Any version
Timeline
| 2025-02-25: | Notification email sent to info@smartbedded.com |
| 2025-03-18: | Notification email sent to info@smartbedded.com |
| 2025-04-10: | Notification email sent to info@smartbedded.com |
| 2025-04-15: | Notification email sent to info@smartbedded.com |
| 2025-04-10: | ONEKEY posts a message on MeteoBridge support forum |
| 2025-04-11: | MeteoBridge support forum administrator delets the forum post and account. |
| 2025-04-27: | ONEKEY notifies the German BSI |
| 2025-05-14: | Smartbedded notifies the German BSI of a patch being available (version 6.2) |
| 2025-05-21: | CVE publication |
Credits
ONEKEY Research Labs
References
www.cisa.gov/...nerabilities-catalog?field_cve=CVE-2025-4008
www.onekey.com/...n-on-smartbedded-meteobridge-cve-2025-4008
forum.meteohub.de/viewtopic.php?t=18687