Home

Description

An Execution with Unnecessary Privileges vulnerability has been identified in Moxa’s network security appliances and routers. A critical authorization flaw in the API allows an authenticated, low-privileged user to create a new administrator account, including accounts with usernames identical to existing users. In certain scenarios, this vulnerability could allow an attacker to gain full administrative control over the affected device, leading to potential account impersonation. While successful exploitation can severely impact the confidentiality, integrity, and availability of the affected device itself, there is no loss of confidentiality or integrity within any subsequent systems.

PUBLISHED Reserved 2025-07-01 | Published 2025-10-17 | Updated 2025-10-17 | Assigner Moxa




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:H

Problem types

CWE-250: Execution with Unnecessary Privileges

Product status

Default status
unaffected

1.0
affected

3.21
unaffected

Default status
unaffected

1.0
affected

3.21
unaffected

Default status
unaffected

1.0
affected

3.21
unaffected

Default status
unaffected

1.0
affected

3.21
unaffected

Default status
unaffected

1.0
affected

3.21
unaffected

Default status
unaffected

1.0
affected

3.21
unaffected

Default status
unaffected

1.0
affected

3.21.0
unaffected

References

www.moxa.com/...-2025-6950-multiple-vulnerabilities-in-netwo vendor-advisory

cve.org (CVE-2025-6949)

nvd.nist.gov (CVE-2025-6949)

Download JSON