An Execution with Unnecessary Privileges vulnerability has been identified in Moxa’s network security appliances and routers. A flaw in broken access control has been identified in the /api/v1/setting/data endpoint of the affected device. This flaw allows a low-privileged authenticated user to call the API without the required permissions, thereby gaining the ability to access or modify system configuration data. Successful exploitation may lead to privilege escalation, allowing the attacker to access or modify sensitive system settings. While the overall impact is high, there is no loss of confidentiality or integrity within any subsequent systems.
Metrics
Affected Vendors & Products
References
History
Fri, 17 Oct 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 17 Oct 2025 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An Execution with Unnecessary Privileges vulnerability has been identified in Moxa’s network security appliances and routers. A flaw in broken access control has been identified in the /api/v1/setting/data endpoint of the affected device. This flaw allows a low-privileged authenticated user to call the API without the required permissions, thereby gaining the ability to access or modify system configuration data. Successful exploitation may lead to privilege escalation, allowing the attacker to access or modify sensitive system settings. While the overall impact is high, there is no loss of confidentiality or integrity within any subsequent systems. | |
Weaknesses | CWE-250 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Moxa
Published:
Updated: 2025-10-17T13:45:31.594Z
Reserved: 2025-06-28T15:51:37.684Z
Link: CVE-2025-6893

Updated: 2025-10-17T13:45:08.105Z

Status : Received
Published: 2025-10-17T03:15:36.380
Modified: 2025-10-17T03:15:36.380
Link: CVE-2025-6893

No data.

No data.