Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-14849 | A vulnerability has been identified in OZW672 (All versions < V8.0), OZW772 (All versions < V8.0). The web service in affected devices does not sanitize the input parameters required for the `exportDiagramPage` endpoint. This could allow an unauthenticated remote attacker to execute arbitrary code with root privileges. |
Fri, 03 Oct 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Siemens ozw672 Firmware
Siemens ozw772 Firmware |
|
| CPEs | cpe:2.3:h:siemens:ozw672:-:*:*:*:*:*:*:* cpe:2.3:h:siemens:ozw772:-:*:*:*:*:*:*:* cpe:2.3:o:siemens:ozw672_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:siemens:ozw772_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Siemens ozw672 Firmware
Siemens ozw772 Firmware |
Tue, 13 May 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 13 May 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability has been identified in OZW672 (All versions < V8.0), OZW772 (All versions < V8.0). The web service in affected devices does not sanitize the input parameters required for the `exportDiagramPage` endpoint. This could allow an unauthenticated remote attacker to execute arbitrary code with root privileges. | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: siemens
Published:
Updated: 2025-05-13T18:58:21.917Z
Reserved: 2025-02-07T15:33:59.767Z
Link: CVE-2025-26389
Updated: 2025-05-13T18:58:02.311Z
Status : Analyzed
Published: 2025-05-13T10:15:23.513
Modified: 2025-10-06T10:34:26.037
Link: CVE-2025-26389
No data.
OpenCVE Enrichment
Updated: 2025-06-16T20:37:57Z
EUVD