Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-23258 | A high privileged remote attacker can execute arbitrary OS commands using an undocumented method allowing to escape the implemented LUA sandbox. |
Thu, 31 Jul 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Helmholz
Helmholz rex 200 Helmholz rex 300 Mbconnectline Mbconnectline mbnet Hw1 Mbconnectline mbnet Mbnet.rokey |
|
| Vendors & Products |
Helmholz
Helmholz rex 200 Helmholz rex 300 Mbconnectline Mbconnectline mbnet Hw1 Mbconnectline mbnet Mbnet.rokey |
Thu, 31 Jul 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 31 Jul 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A high privileged remote attacker can execute arbitrary OS commands using an undocumented method allowing to escape the implemented LUA sandbox. | |
| Title | High Privilege RCE via LUA Sandbox Escape | |
| Weaknesses | CWE-653 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2025-07-31T13:17:23.918Z
Reserved: 2025-04-16T11:17:48.309Z
Link: CVE-2025-41688
Updated: 2025-07-31T13:17:19.887Z
Status : Deferred
Published: 2025-07-31T10:15:26.763
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-41688
No data.
OpenCVE Enrichment
Updated: 2025-07-31T20:56:24Z
EUVD