CVE-2025-41683: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Weidmueller IE-SR-2TX-WL
An authenticated remote attacker can execute arbitrary commands with root privileges on affected devices due to lack of improper sanitizing of user input in the Main Web Interface (endpoint event_mail_test).
AI Analysis
Technical Summary
CVE-2025-41683 is a high-severity OS command injection vulnerability (CWE-78) affecting the Weidmueller IE-SR-2TX-WL device, specifically in version V0.0. The vulnerability arises from improper neutralization of special elements in user input submitted to the device's Main Web Interface, particularly the 'event_mail_test' endpoint. An authenticated remote attacker can exploit this flaw to execute arbitrary OS commands with root privileges. This means that once authenticated, an attacker can inject malicious commands that the system executes with the highest level of privileges, potentially leading to full system compromise. The vulnerability has a CVSS 3.1 base score of 8.8, reflecting its high impact on confidentiality, integrity, and availability. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), and only requires privileges (PR:L) but no user interaction (UI:N). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability was reserved in April 2025 and published in July 2025. The IE-SR-2TX-WL is an industrial Ethernet switch used in automation and control environments, making this vulnerability particularly critical in operational technology (OT) contexts where device integrity and uptime are paramount.
Potential Impact
For European organizations, especially those in industrial sectors such as manufacturing, energy, transportation, and critical infrastructure, this vulnerability poses a significant risk. Exploitation could lead to unauthorized root-level control over network switches, enabling attackers to disrupt network traffic, intercept or manipulate data, and potentially pivot to other critical systems within the OT environment. This could result in operational downtime, safety hazards, data breaches, and significant financial and reputational damage. Given the device's role in industrial networks, availability impact is critical, as disruption could halt production lines or critical services. Confidentiality and integrity impacts are also severe, as attackers could exfiltrate sensitive operational data or alter configurations to cause long-term damage. The requirement for authentication limits the attack surface but does not eliminate risk, especially if credential management is weak or if attackers gain access through phishing or insider threats.
Mitigation Recommendations
European organizations using the Weidmueller IE-SR-2TX-WL should immediately assess their exposure to this vulnerability. Specific mitigation steps include: 1) Restrict access to the device's web interface to trusted management networks only, using network segmentation and firewall rules to limit exposure. 2) Enforce strong authentication mechanisms and rotate credentials regularly to reduce the risk of credential compromise. 3) Monitor device logs and network traffic for unusual activity indicative of exploitation attempts, focusing on the 'event_mail_test' endpoint usage. 4) Implement strict input validation and sanitization on any custom integrations or management scripts interacting with the device, if applicable. 5) Engage with Weidmueller support or authorized vendors to obtain patches or firmware updates as soon as they become available. 6) Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect command injection patterns targeting this device. 7) Conduct regular security audits and penetration testing of OT networks to identify and remediate similar vulnerabilities proactively.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Poland, Sweden
CVE-2025-41683: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Weidmueller IE-SR-2TX-WL
Description
An authenticated remote attacker can execute arbitrary commands with root privileges on affected devices due to lack of improper sanitizing of user input in the Main Web Interface (endpoint event_mail_test).
AI-Powered Analysis
Technical Analysis
CVE-2025-41683 is a high-severity OS command injection vulnerability (CWE-78) affecting the Weidmueller IE-SR-2TX-WL device, specifically in version V0.0. The vulnerability arises from improper neutralization of special elements in user input submitted to the device's Main Web Interface, particularly the 'event_mail_test' endpoint. An authenticated remote attacker can exploit this flaw to execute arbitrary OS commands with root privileges. This means that once authenticated, an attacker can inject malicious commands that the system executes with the highest level of privileges, potentially leading to full system compromise. The vulnerability has a CVSS 3.1 base score of 8.8, reflecting its high impact on confidentiality, integrity, and availability. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), and only requires privileges (PR:L) but no user interaction (UI:N). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability was reserved in April 2025 and published in July 2025. The IE-SR-2TX-WL is an industrial Ethernet switch used in automation and control environments, making this vulnerability particularly critical in operational technology (OT) contexts where device integrity and uptime are paramount.
Potential Impact
For European organizations, especially those in industrial sectors such as manufacturing, energy, transportation, and critical infrastructure, this vulnerability poses a significant risk. Exploitation could lead to unauthorized root-level control over network switches, enabling attackers to disrupt network traffic, intercept or manipulate data, and potentially pivot to other critical systems within the OT environment. This could result in operational downtime, safety hazards, data breaches, and significant financial and reputational damage. Given the device's role in industrial networks, availability impact is critical, as disruption could halt production lines or critical services. Confidentiality and integrity impacts are also severe, as attackers could exfiltrate sensitive operational data or alter configurations to cause long-term damage. The requirement for authentication limits the attack surface but does not eliminate risk, especially if credential management is weak or if attackers gain access through phishing or insider threats.
Mitigation Recommendations
European organizations using the Weidmueller IE-SR-2TX-WL should immediately assess their exposure to this vulnerability. Specific mitigation steps include: 1) Restrict access to the device's web interface to trusted management networks only, using network segmentation and firewall rules to limit exposure. 2) Enforce strong authentication mechanisms and rotate credentials regularly to reduce the risk of credential compromise. 3) Monitor device logs and network traffic for unusual activity indicative of exploitation attempts, focusing on the 'event_mail_test' endpoint usage. 4) Implement strict input validation and sanitization on any custom integrations or management scripts interacting with the device, if applicable. 5) Engage with Weidmueller support or authorized vendors to obtain patches or firmware updates as soon as they become available. 6) Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect command injection patterns targeting this device. 7) Conduct regular security audits and penetration testing of OT networks to identify and remediate similar vulnerabilities proactively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- CERTVDE
- Date Reserved
- 2025-04-16T11:17:48.309Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68809e2ead5a09ad000c576d
Added to database: 7/23/2025, 8:32:46 AM
Last enriched: 7/23/2025, 8:48:10 AM
Last updated: 7/24/2025, 12:33:56 AM
Views: 7
Related Threats
CVE-2025-5039: CWE-426 Untrusted Search Path in Autodesk RealDWG
HighCVE-2025-45702: n/a
HighCVE-2025-46996: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager
MediumCVE-2025-46993: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager
MediumCVE-2025-47061: Cross-site Scripting (Stored XSS) (CWE-79) in Adobe Adobe Experience Manager
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.