Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41735: CWE-434 Unrestricted Upload of File with Dangerous Type in METZ CONNECT Energy-Controlling EWIO2-M

0
High
VulnerabilityCVE-2025-41735cvecve-2025-41735cwe-434
Published: Tue Nov 18 2025 (11/18/2025, 10:18:15 UTC)
Source: CVE Database V5
Vendor/Project: METZ CONNECT
Product: Energy-Controlling EWIO2-M

Description

A low privileged remote attacker can upload any file to an arbitrary location due to missing file check resulting in remote code execution.

AI-Powered Analysis

AILast updated: 11/18/2025, 10:44:58 UTC

Technical Analysis

CVE-2025-41735 is a vulnerability classified under CWE-434, indicating an Unrestricted Upload of File with Dangerous Type in the METZ CONNECT Energy-Controlling EWIO2-M device. The flaw arises from the device's failure to properly validate uploaded files, allowing a remote attacker with low privileges to upload arbitrary files to any location on the device. This lack of file type checking enables the attacker to place malicious payloads that can be executed remotely, resulting in full remote code execution (RCE). The vulnerability is exploitable over the network without user interaction and requires only low privileges, which significantly lowers the barrier for exploitation. The CVSS v3.1 score of 8.8 reflects the critical impact on confidentiality, integrity, and availability, as an attacker could fully compromise the device, potentially disrupting energy management operations. The affected version is listed as 0.0.0, which likely indicates all current versions prior to a patch are vulnerable. No patches or known exploits are currently available, but the vulnerability is publicly disclosed and should be treated with urgency. The device is typically used in energy control environments, making it a high-value target for attackers aiming to disrupt industrial control systems or critical infrastructure.

Potential Impact

For European organizations, especially those in the energy sector, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized control over energy-controlling devices, potentially causing operational disruptions, data breaches, or sabotage of energy infrastructure. The confidentiality of operational data could be compromised, integrity of control commands altered, and availability of energy management systems disrupted, leading to cascading effects on dependent services and industries. Given Europe’s strong focus on energy security and the increasing digitization of industrial control systems, this vulnerability could be leveraged by threat actors to conduct espionage, sabotage, or ransomware attacks. Organizations relying on METZ CONNECT devices in critical infrastructure, manufacturing, or smart grid environments are particularly vulnerable. The lack of current patches increases the window of exposure, emphasizing the need for immediate risk mitigation.

Mitigation Recommendations

1. Immediately restrict network access to the EWIO2-M device management interfaces using firewalls and network segmentation to limit exposure to trusted administrators only. 2. Implement strict application-layer filtering or web application firewalls (WAFs) to detect and block malicious file uploads or unusual file types. 3. Monitor device logs and network traffic for signs of unauthorized upload attempts or anomalous behavior indicative of exploitation attempts. 4. Engage with METZ CONNECT for official patches or firmware updates and apply them as soon as they become available. 5. Employ multi-factor authentication and strong credential management to reduce the risk of low-privilege account compromise. 6. Conduct regular security audits and penetration testing focused on file upload functionalities and remote management interfaces. 7. Develop and test incident response plans specifically addressing potential compromises of energy-controlling devices. 8. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned for industrial control system protocols and behaviors.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
CERTVDE
Date Reserved
2025-04-16T11:17:48.320Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691c4a8a8ab8e3b58140670e

Added to database: 11/18/2025, 10:29:30 AM

Last enriched: 11/18/2025, 10:44:58 AM

Last updated: 11/18/2025, 9:07:40 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats