CVE-2025-41735: CWE-434 Unrestricted Upload of File with Dangerous Type in METZ CONNECT Energy-Controlling EWIO2-M
A low privileged remote attacker can upload any file to an arbitrary location due to missing file check resulting in remote code execution.
AI Analysis
Technical Summary
CVE-2025-41735 is a vulnerability identified in the METZ CONNECT Energy-Controlling EWIO2-M device, classified under CWE-434 (Unrestricted Upload of File with Dangerous Type). The flaw allows a remote attacker with low privileges to upload arbitrary files to any location on the device due to the absence of proper file type validation during the upload process. This lack of restriction enables attackers to place malicious payloads, such as web shells or scripts, that can be executed remotely, leading to full remote code execution (RCE). The vulnerability is exploitable over the network without requiring user interaction, and the attacker does not need elevated privileges beyond low-level access, which significantly lowers the barrier to exploitation. The CVSS v3.1 score of 8.8 reflects the critical impact on confidentiality, integrity, and availability, as successful exploitation can compromise the device, disrupt energy control operations, and potentially pivot into broader network environments. The affected product, EWIO2-M, is used in energy management and control systems, making the vulnerability particularly sensitive given the critical nature of such infrastructure. No patches or fixes have been published yet, and no known exploits are reported in the wild, but the risk remains high due to the nature of the flaw and the criticality of the affected systems.
Potential Impact
For European organizations, especially those involved in energy management, industrial automation, and critical infrastructure, this vulnerability poses a significant threat. Exploitation could lead to unauthorized control over energy-controlling devices, resulting in operational disruptions, potential physical damage, and data breaches. The compromise of such devices could also serve as a foothold for attackers to move laterally within networks, escalating attacks to other critical systems. Given the strategic importance of energy infrastructure in Europe, successful attacks could have cascading effects on national security, economic stability, and public safety. Additionally, regulatory compliance risks arise, as organizations may fail to meet cybersecurity standards such as NIS2 or GDPR if they do not adequately protect these systems. The absence of patches increases the urgency for proactive defense measures to prevent exploitation.
Mitigation Recommendations
Organizations should immediately implement network segmentation to isolate EWIO2-M devices from general IT networks and limit exposure to untrusted networks. Strict access controls should be enforced, ensuring only authorized personnel and systems can communicate with these devices. Deploying web application firewalls (WAFs) or intrusion prevention systems (IPS) with rules to detect and block suspicious file upload attempts can provide additional protection. Monitoring logs and network traffic for anomalous activities related to file uploads or unexpected file creations is critical. Vendors and users should prioritize the development and deployment of patches or firmware updates that enforce strict file type validation and restrict upload locations. Until patches are available, disabling or restricting file upload functionality where possible can reduce risk. Conducting regular security assessments and penetration tests focused on these devices will help identify and remediate weaknesses. Finally, raising awareness among operational technology (OT) teams about this vulnerability ensures timely detection and response.
Affected Countries
Germany, France, Netherlands, Belgium, Italy, Poland
CVE-2025-41735: CWE-434 Unrestricted Upload of File with Dangerous Type in METZ CONNECT Energy-Controlling EWIO2-M
Description
A low privileged remote attacker can upload any file to an arbitrary location due to missing file check resulting in remote code execution.
AI-Powered Analysis
Technical Analysis
CVE-2025-41735 is a vulnerability identified in the METZ CONNECT Energy-Controlling EWIO2-M device, classified under CWE-434 (Unrestricted Upload of File with Dangerous Type). The flaw allows a remote attacker with low privileges to upload arbitrary files to any location on the device due to the absence of proper file type validation during the upload process. This lack of restriction enables attackers to place malicious payloads, such as web shells or scripts, that can be executed remotely, leading to full remote code execution (RCE). The vulnerability is exploitable over the network without requiring user interaction, and the attacker does not need elevated privileges beyond low-level access, which significantly lowers the barrier to exploitation. The CVSS v3.1 score of 8.8 reflects the critical impact on confidentiality, integrity, and availability, as successful exploitation can compromise the device, disrupt energy control operations, and potentially pivot into broader network environments. The affected product, EWIO2-M, is used in energy management and control systems, making the vulnerability particularly sensitive given the critical nature of such infrastructure. No patches or fixes have been published yet, and no known exploits are reported in the wild, but the risk remains high due to the nature of the flaw and the criticality of the affected systems.
Potential Impact
For European organizations, especially those involved in energy management, industrial automation, and critical infrastructure, this vulnerability poses a significant threat. Exploitation could lead to unauthorized control over energy-controlling devices, resulting in operational disruptions, potential physical damage, and data breaches. The compromise of such devices could also serve as a foothold for attackers to move laterally within networks, escalating attacks to other critical systems. Given the strategic importance of energy infrastructure in Europe, successful attacks could have cascading effects on national security, economic stability, and public safety. Additionally, regulatory compliance risks arise, as organizations may fail to meet cybersecurity standards such as NIS2 or GDPR if they do not adequately protect these systems. The absence of patches increases the urgency for proactive defense measures to prevent exploitation.
Mitigation Recommendations
Organizations should immediately implement network segmentation to isolate EWIO2-M devices from general IT networks and limit exposure to untrusted networks. Strict access controls should be enforced, ensuring only authorized personnel and systems can communicate with these devices. Deploying web application firewalls (WAFs) or intrusion prevention systems (IPS) with rules to detect and block suspicious file upload attempts can provide additional protection. Monitoring logs and network traffic for anomalous activities related to file uploads or unexpected file creations is critical. Vendors and users should prioritize the development and deployment of patches or firmware updates that enforce strict file type validation and restrict upload locations. Until patches are available, disabling or restricting file upload functionality where possible can reduce risk. Conducting regular security assessments and penetration tests focused on these devices will help identify and remediate weaknesses. Finally, raising awareness among operational technology (OT) teams about this vulnerability ensures timely detection and response.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- CERTVDE
- Date Reserved
- 2025-04-16T11:17:48.320Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691c4a8a8ab8e3b58140670e
Added to database: 11/18/2025, 10:29:30 AM
Last enriched: 11/25/2025, 11:14:05 AM
Last updated: 1/7/2026, 6:09:07 AM
Views: 60
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14835: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in opajaap WP Photo Album Plus
HighCVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.