Home

Description

A high-privileged remote attacker can fully compromise the device by abusing an update signature bypass vulnerability in the wwwupdate.cgi method in the web interface of UBR.

PUBLISHED Reserved 2025-04-16 | Published 2026-03-09 | Updated 2026-03-09 | Assigner CERTVDE




HIGH: 7.2CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-347 Improper Verification of Cryptographic Signature

Product status

Default status
unaffected

0.0.0 (semver) before 6.0.1.0
affected

Default status
unaffected

0.0.0 (semver) before 6.0.1.0
affected

Default status
unaffected

0.0.0 (semver) before 6.0.1.0
affected

Credits

Adrien Rey from Cyber Defense Campus Zurich finder

Daniel Hulliger from Armasuisse finder

References

www.mbs-solutions.de/mbs-2025-0001

cve.org (CVE-2025-41767)

nvd.nist.gov (CVE-2025-41767)

Download JSON