Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-22436 | An authenticated remote attacker can execute arbitrary commands with root privileges on affected devices due to lack of improper sanitizing of user input in the Main Web Interface (endpoint event_mail_test). |
| Link | Providers |
|---|---|
| https://certvde.com/de/advisories/VDE-2025-052 |
|
Wed, 23 Jul 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Weidmueller
Weidmueller ie-sr-2tx-wl Weidmueller ie-sr-2tx-wl-4g-eu Weidmueller ie-sr-2tx-wl-4g-us-v |
|
| Vendors & Products |
Weidmueller
Weidmueller ie-sr-2tx-wl Weidmueller ie-sr-2tx-wl-4g-eu Weidmueller ie-sr-2tx-wl-4g-us-v |
Wed, 23 Jul 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 23 Jul 2025 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An authenticated remote attacker can execute arbitrary commands with root privileges on affected devices due to lack of improper sanitizing of user input in the Main Web Interface (endpoint event_mail_test). | |
| Title | Weidmueller: Root Command Injection via Unsanitized Input in event_mail_test Endpoint | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2025-07-23T14:08:32.342Z
Reserved: 2025-04-16T11:17:48.309Z
Link: CVE-2025-41683
Updated: 2025-07-23T14:08:29.490Z
Status : Deferred
Published: 2025-07-23T09:15:25.573
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-41683
No data.
OpenCVE Enrichment
Updated: 2025-07-23T17:35:51Z
EUVD