Skip to main content

CVE-2025-41684: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Weidmueller IE-SR-2TX-WL

High
VulnerabilityCVE-2025-41684cvecve-2025-41684cwe-78
Published: Wed Jul 23 2025 (07/23/2025, 08:23:28 UTC)
Source: CVE Database V5
Vendor/Project: Weidmueller
Product: IE-SR-2TX-WL

Description

An authenticated remote attacker can execute arbitrary commands with root privileges on affected devices due to lack of improper sanitizing of user input in the Main Web Interface (endpoint tls_iotgen_setting).

AI-Powered Analysis

AILast updated: 07/23/2025, 08:47:54 UTC

Technical Analysis

CVE-2025-41684 is a high-severity vulnerability affecting the Weidmueller IE-SR-2TX-WL industrial Ethernet switch, specifically version V0.0. The vulnerability is classified as CWE-78, which corresponds to improper neutralization of special elements used in an OS command, commonly known as OS command injection. This flaw exists in the device's Main Web Interface, particularly at the endpoint tls_iotgen_setting. An authenticated remote attacker can exploit this vulnerability by sending crafted input that is not properly sanitized by the device, allowing arbitrary OS commands to be executed with root privileges. The vulnerability requires the attacker to have valid credentials (authentication) but does not require any user interaction beyond that. The CVSS v3.1 base score is 8.8, indicating a high impact on confidentiality, integrity, and availability. The attack vector is network-based (AV:N), with low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), and the scope remains unchanged (S:U). Successful exploitation could lead to full system compromise, including control over device configuration, interception or manipulation of network traffic, and potential pivoting to other network segments. No patches or known exploits in the wild have been reported as of the publication date (July 23, 2025).

Potential Impact

For European organizations, especially those in industrial sectors such as manufacturing, energy, and critical infrastructure, this vulnerability poses a significant risk. The Weidmueller IE-SR-2TX-WL is an industrial Ethernet switch used in automation and control networks. Compromise of these devices can lead to disruption of industrial processes, data breaches, and potential safety hazards. Given the root-level access achievable, attackers could manipulate network traffic, disable security controls, or cause denial of service. This could impact operational technology (OT) environments that are increasingly integrated with IT networks, raising the risk of cascading failures. Additionally, the breach of such devices could facilitate lateral movement within corporate networks, exposing sensitive business data and intellectual property. The high severity and ease of exploitation (once authenticated) make this a critical concern for European industrial enterprises, utilities, and infrastructure operators.

Mitigation Recommendations

1. Immediate mitigation should include restricting access to the Main Web Interface (tls_iotgen_setting endpoint) to trusted management networks only, using network segmentation and firewall rules to limit exposure. 2. Enforce strong authentication mechanisms and regularly audit credentials to prevent unauthorized access. 3. Monitor device logs and network traffic for unusual command execution patterns or unexpected administrative actions. 4. Implement multi-factor authentication (MFA) if supported by the device or surrounding infrastructure to reduce risk of credential compromise. 5. Since no patches are currently available, consider deploying compensating controls such as disabling the vulnerable web interface if feasible or replacing affected devices with updated models. 6. Conduct thorough security assessments of industrial network devices to identify similar vulnerabilities. 7. Maintain an incident response plan tailored to OT environments to quickly isolate and remediate affected devices in case of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERTVDE
Date Reserved
2025-04-16T11:17:48.309Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68809e2ead5a09ad000c5770

Added to database: 7/23/2025, 8:32:46 AM

Last enriched: 7/23/2025, 8:47:54 AM

Last updated: 7/23/2025, 2:34:18 PM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats