Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-22435 | An authenticated remote attacker can execute arbitrary commands with root privileges on affected devices due to lack of improper sanitizing of user input in the Main Web Interface (endpoint tls_iotgen_setting). |
| Link | Providers |
|---|---|
| https://certvde.com/de/advisories/VDE-2025-052 |
|
Wed, 23 Jul 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Weidmueller
Weidmueller ie-sr-2tx-wl Weidmueller ie-sr-2tx-wl-4g-eu Weidmueller ie-sr-2tx-wl-4g-us-v |
|
| Vendors & Products |
Weidmueller
Weidmueller ie-sr-2tx-wl Weidmueller ie-sr-2tx-wl-4g-eu Weidmueller ie-sr-2tx-wl-4g-us-v |
Wed, 23 Jul 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 23 Jul 2025 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An authenticated remote attacker can execute arbitrary commands with root privileges on affected devices due to lack of improper sanitizing of user input in the Main Web Interface (endpoint tls_iotgen_setting). | |
| Title | Weidmueller: Root Command Injection via Unsanitized Input in tls_iotgen_setting Endpoint | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2025-07-23T14:04:20.683Z
Reserved: 2025-04-16T11:17:48.309Z
Link: CVE-2025-41684
Updated: 2025-07-23T14:04:17.981Z
Status : Deferred
Published: 2025-07-23T09:15:25.747
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-41684
No data.
OpenCVE Enrichment
Updated: 2025-07-23T17:35:51Z
EUVD