Description
An unauthenticated remote attacker can crash the wscserver by sending incomplete SOAP requests. The wscserver process will not be restarted by a watchdog and a device reboot is necessary to make it work again.
Published: 2025-10-22
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Oct 2025 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Sauter
Sauter ey-modulo 5 Devices
Sauter modulo 6 Devices
Sauter wscserver
Vendors & Products Sauter
Sauter ey-modulo 5 Devices
Sauter modulo 6 Devices
Sauter wscserver

Wed, 22 Oct 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 22 Oct 2025 07:15:00 +0000

Type Values Removed Values Added
Description An unauthenticated remote attacker can crash the wscserver by sending incomplete SOAP requests. The wscserver process will not be restarted by a watchdog and a device reboot is necessary to make it work again.
Title Sauter: Crash via Incomplete SOAP Request
Weaknesses CWE-239
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Sauter Ey-modulo 5 Devices Modulo 6 Devices Wscserver
cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2025-10-22T15:48:40.087Z

Reserved: 2025-04-16T11:17:48.318Z

Link: CVE-2025-41724

cve-icon Vulnrichment

Updated: 2025-10-22T15:48:36.458Z

cve-icon NVD

Status : Deferred

Published: 2025-10-22T07:15:33.983

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-41724

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-10-23T10:08:02Z

Weaknesses