Skip to main content

CVE-2025-41687: CWE-121 Stack-based Buffer Overflow in Weidmueller IE-SR-2TX-WL

Critical
VulnerabilityCVE-2025-41687cvecve-2025-41687cwe-121
Published: Wed Jul 23 2025 (07/23/2025, 08:23:52 UTC)
Source: CVE Database V5
Vendor/Project: Weidmueller
Product: IE-SR-2TX-WL

Description

An unauthenticated remote attacker may use a stack based buffer overflow in the u-link Management API to gain full access on the affected devices.

AI-Powered Analysis

AILast updated: 07/23/2025, 08:47:43 UTC

Technical Analysis

CVE-2025-41687 is a critical security vulnerability identified as a stack-based buffer overflow (CWE-121) in the u-link Management API of the Weidmueller IE-SR-2TX-WL industrial Ethernet switch. This vulnerability allows an unauthenticated remote attacker to exploit the buffer overflow condition to execute arbitrary code or commands on the affected device, potentially gaining full administrative control. The vulnerability exists due to improper bounds checking in the handling of input data within the management API, which can be triggered remotely without any authentication or user interaction. The CVSS v3.1 score of 9.8 reflects the high severity, with attack vector being network-based (AV:N), no privileges required (PR:N), no user interaction (UI:N), and full impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The affected product version is V0.0, indicating early or initial firmware releases. No patches or mitigations have been published yet, and there are no known exploits in the wild at the time of disclosure. Given the nature of the device as an industrial Ethernet switch, exploitation could lead to complete compromise of network infrastructure components, enabling attackers to intercept, manipulate, or disrupt industrial control communications and potentially cause operational downtime or safety hazards.

Potential Impact

For European organizations, particularly those in critical infrastructure sectors such as manufacturing, energy, transportation, and utilities, this vulnerability poses a significant risk. The IE-SR-2TX-WL switches are likely deployed in industrial environments where network reliability and security are paramount. Exploitation could lead to unauthorized access to network management interfaces, allowing attackers to manipulate traffic flows, disrupt communications, or pivot to other internal systems. This could result in operational disruptions, data breaches, and safety incidents. The unauthenticated nature of the exploit increases the risk of remote attacks from external threat actors, including cybercriminals or state-sponsored groups targeting European industrial networks. The potential for full device compromise also raises concerns about long-term persistence and espionage. Given the criticality of industrial control systems in Europe’s economy and infrastructure, the impact could be severe, affecting both private sector enterprises and public utilities.

Mitigation Recommendations

Immediate mitigation steps include isolating affected devices from untrusted networks to reduce exposure to remote attackers. Network segmentation should be enforced to limit access to management interfaces of the IE-SR-2TX-WL switches. Organizations should implement strict firewall rules and access control lists (ACLs) to restrict inbound traffic to trusted sources only. Monitoring network traffic for anomalous activity targeting the u-link Management API is recommended to detect potential exploitation attempts. Since no official patches are available, organizations should engage with Weidmueller support channels to obtain firmware updates or security advisories. Where possible, replace vulnerable devices with updated or alternative hardware that has been verified as secure. Additionally, conducting regular security assessments and penetration tests focusing on industrial network components can help identify and remediate related vulnerabilities. Incident response plans should be updated to include scenarios involving industrial network device compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERTVDE
Date Reserved
2025-04-16T11:17:48.309Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68809e2ead5a09ad000c5773

Added to database: 7/23/2025, 8:32:46 AM

Last enriched: 7/23/2025, 8:47:43 AM

Last updated: 7/23/2025, 2:17:45 PM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats