3onedata modbus gateway device model GW1101-1D(RS-485)-TB-P (hardware version V2.2.0) allows authenticated users to execute arbitrary shell commands in the context of the root user by providing payload in the "IP address" field of the diagnosis test tools. This issue has been resolved in firmware version 3.0.59B2024080600R4353
History

Mon, 04 May 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared 3onedata
3onedata gw1101-1d(rs-485)-tb-p
Vendors & Products 3onedata
3onedata gw1101-1d(rs-485)-tb-p

Mon, 04 May 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 04 May 2026 15:00:00 +0000

Type Values Removed Values Added
Description 3onedata modbus gateway device model GW1101-1D(RS-485)-TB-P (hardware version V2.2.0) allows authenticated users to execute arbitrary shell commands in the context of the root user by providing payload in the "IP address" field of the diagnosis test tools. This issue has been resolved in firmware version 3.0.59B2024080600R4353
Title Shell command injection in 3onedata GW1101-1D(RS-485)-TB-P modbus gateway
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-PL

Published:

Updated: 2026-05-04T15:28:56.851Z

Reserved: 2025-11-24T14:44:56.542Z

Link: CVE-2025-13605

cve-icon Vulnrichment

Updated: 2026-05-04T15:28:44.757Z

cve-icon NVD

Status : Received

Published: 2026-05-04T15:16:02.630

Modified: 2026-05-04T15:16:02.630

Link: CVE-2025-13605

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-04T19:44:08Z