Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13087: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Opto22 GRV-EPIC-PR1

0
High
VulnerabilityCVE-2025-13087cvecve-2025-13087cwe-78
Published: Thu Nov 20 2025 (11/20/2025, 21:32:37 UTC)
Source: CVE Database V5
Vendor/Project: Opto22
Product: GRV-EPIC-PR1

Description

A vulnerability exists in the Opto22 Groov Manage REST API on GRV-EPIC and groov RIO Products that allows remote code execution with root privileges. When a POST request is executed against the vulnerable endpoint, the application reads certain header details and unsafely uses these values to build commands, allowing an attacker with administrative privileges to inject arbitrary commands that execute as root.

AI-Powered Analysis

AILast updated: 11/20/2025, 21:58:32 UTC

Technical Analysis

CVE-2025-13087 is an OS command injection vulnerability classified under CWE-78, affecting the Opto22 Groov Manage REST API on GRV-EPIC and groov RIO products. The vulnerability arises because the REST API improperly sanitizes certain HTTP header values used to construct OS commands. When a POST request is sent to the vulnerable endpoint, the application reads these header details and directly incorporates them into command strings without adequate neutralization of special characters or command delimiters. This flaw allows an attacker who already has administrative privileges on the device to inject arbitrary OS commands that execute with root privileges, effectively enabling remote code execution at the highest system level. The CVSS 4.0 base score is 7.5, reflecting a high severity due to network attack vector, high attack complexity, and the requirement for high privileges but no user interaction. The vulnerability does not require user interaction but does require the attacker to have administrative rights, which limits exploitation to insiders or attackers who have already compromised credentials. No public exploits or patches are currently available, but the potential impact is severe given the root-level access and the critical nature of these industrial control devices. The vulnerability affects all versions listed as '0' (likely indicating initial or all versions prior to patching). The Groov EPIC and groov RIO products are commonly used in industrial automation and control systems, making this a significant risk for operational technology environments.

Potential Impact

The impact of CVE-2025-13087 on European organizations is substantial, particularly for those in industrial sectors such as manufacturing, energy, utilities, and critical infrastructure that rely on Opto22 GRV-EPIC and groov RIO devices for automation and control. Successful exploitation allows attackers to execute arbitrary commands as root, potentially leading to full system compromise, disruption of industrial processes, data theft, or sabotage. This could result in operational downtime, safety hazards, financial losses, and reputational damage. Given the root-level access, attackers could manipulate device configurations, disable security controls, or pivot to other network segments. The requirement for administrative privileges limits the attack surface but also highlights the importance of protecting privileged credentials. European organizations with interconnected IT and OT environments may face increased risk of lateral movement and broader network compromise. The vulnerability's network-exposed REST API makes remote exploitation feasible if administrative access is not properly restricted. Therefore, the threat is particularly critical for organizations with remote management capabilities or insufficient network segmentation between IT and OT systems.

Mitigation Recommendations

1. Apply vendor patches immediately once they become available to address the vulnerability at the source. 2. Restrict administrative access to the Groov Manage REST API by implementing strong network segmentation and firewall rules to limit access only to trusted management networks or VPNs. 3. Enforce strict authentication and authorization controls to prevent unauthorized administrative access, including multi-factor authentication for privileged accounts. 4. Implement input validation and sanitization on all user-supplied data, especially HTTP headers, to prevent injection of malicious commands. 5. Monitor network traffic to and from the affected devices for unusual POST requests or command injection patterns. 6. Conduct regular audits of administrative accounts and credentials to detect and revoke any unauthorized access. 7. Employ intrusion detection/prevention systems tailored for industrial control systems to detect exploitation attempts. 8. Educate OT and IT staff about the risks of privilege misuse and the importance of securing administrative interfaces. 9. Consider isolating critical OT devices from general IT networks to reduce exposure. 10. Maintain up-to-date asset inventories to quickly identify affected devices and prioritize remediation efforts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2025-11-12T19:41:06.455Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691f8b86b342c1dca4180130

Added to database: 11/20/2025, 9:43:34 PM

Last enriched: 11/20/2025, 9:58:32 PM

Last updated: 11/21/2025, 12:51:08 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats