Home

Description

An Execution with Unnecessary Privileges vulnerability has been identified in Moxa’s network security appliances and routers. A flaw in broken access control has been identified in the /api/v1/setting/data endpoint of the affected device. This flaw allows a low-privileged authenticated user to call the API without the required permissions, thereby gaining the ability to access or modify system configuration data. Successful exploitation may lead to privilege escalation, allowing the attacker to access or modify sensitive system settings. While the overall impact is high, there is no loss of confidentiality or integrity within any subsequent systems.

PUBLISHED Reserved 2025-06-28 | Published 2025-10-17 | Updated 2025-10-17 | Assigner Moxa




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:H

Problem types

CWE-250: Execution with Unnecessary Privileges

Product status

Default status
unaffected

1.0
affected

3.21
unaffected

Default status
unaffected

1.0
affected

3.21
unaffected

Default status
unaffected

1.0
affected

3.21
unaffected

Default status
unaffected

1.0
affected

3.21
unaffected

Default status
unaffected

1.0
affected

3.21
unaffected

Default status
unaffected

1.0
affected

3.21
unaffected

Default status
unaffected

1.0
affected

3.21.0
unaffected

References

www.moxa.com/...-2025-6950-multiple-vulnerabilities-in-netwo vendor-advisory

cve.org (CVE-2025-6893)

nvd.nist.gov (CVE-2025-6893)

Download JSON