Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41764: CWE-862 Missing Authorization in MBS UBR-01 Mk II

0
Critical
VulnerabilityCVE-2025-41764cvecve-2025-41764cwe-862
Published: Mon Mar 09 2026 (03/09/2026, 08:17:45 UTC)
Source: CVE Database V5
Vendor/Project: MBS
Product: UBR-01 Mk II

Description

Due to insufficient authorization enforcement, an unauthorized remote attacker can exploit the wwwupdate.cgi endpoint to upload and apply arbitrary updates.

AI-Powered Analysis

AILast updated: 03/09/2026, 08:53:03 UTC

Technical Analysis

CVE-2025-41764 is a critical security vulnerability identified in the MBS UBR-01 Mk II device, classified under CWE-862 (Missing Authorization). The vulnerability arises from insufficient authorization enforcement on the device's wwwupdate.cgi endpoint, which is responsible for handling firmware or software updates. Due to this flaw, an unauthenticated remote attacker can directly upload and apply arbitrary updates without any credentials or user interaction. This capability allows attackers to overwrite legitimate firmware or software with malicious versions, potentially gaining full control over the device. The vulnerability has a CVSS 3.1 base score of 9.1, indicating a critical severity level, with attack vector being network (AV:N), no privileges required (PR:N), no user interaction (UI:N), and impact affecting integrity and availability (I:H/A:H). The scope remains unchanged (S:U), meaning the impact is confined to the vulnerable component. The affected product, MBS UBR-01 Mk II, is likely a network or communication device, and the affected version is listed as 0.0.0, which may indicate all current versions or a placeholder. No patches have been published yet, and no known exploits are reported in the wild, but the vulnerability's nature makes it highly exploitable. The missing authorization check on a critical update endpoint represents a severe security design flaw, enabling attackers to compromise device integrity and availability remotely and stealthily. This could lead to device malfunction, network disruption, or use as a pivot point for lateral movement within organizational networks.

Potential Impact

The impact of CVE-2025-41764 is severe for organizations using the MBS UBR-01 Mk II device. Successful exploitation allows attackers to upload and apply arbitrary updates, effectively granting them full control over the device. This can lead to permanent device compromise, disruption of network services, and potential data loss or corruption. Since the device likely plays a role in network infrastructure, its compromise could facilitate further attacks, including lateral movement, espionage, or sabotage. The lack of authentication means attackers can exploit this vulnerability remotely without any prior access or user interaction, increasing the risk of widespread attacks. Organizations relying on these devices for critical communications or network routing may experience significant operational downtime and security breaches. Additionally, malicious updates could introduce backdoors or malware, complicating detection and remediation efforts. The absence of patches increases the urgency for interim mitigations to prevent exploitation.

Mitigation Recommendations

1. Immediate application of vendor-provided patches once available is the most effective mitigation. Monitor MBS advisories closely for updates addressing this vulnerability. 2. Until patches are released, restrict network access to the wwwupdate.cgi endpoint by implementing strict firewall rules or access control lists (ACLs) to allow only trusted management hosts. 3. Isolate the MBS UBR-01 Mk II devices from untrusted or public networks to reduce exposure to remote attackers. 4. Employ network intrusion detection/prevention systems (IDS/IPS) to monitor and block suspicious attempts to access or upload updates via the vulnerable endpoint. 5. Conduct regular integrity checks on device firmware and software to detect unauthorized modifications. 6. Implement strong network segmentation to limit the impact of a compromised device and prevent lateral movement. 7. Maintain comprehensive logging and monitoring of update activities to quickly identify exploitation attempts. 8. Educate network administrators about the vulnerability and the importance of securing update mechanisms. 9. Consider temporary disabling or removing remote update functionality if feasible until a secure patch is applied. 10. Engage with MBS support for guidance and potential workarounds specific to the UBR-01 Mk II device.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
CERTVDE
Date Reserved
2025-04-16T11:18:45.760Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69ae86d82904315ca3e5dc39

Added to database: 3/9/2026, 8:37:44 AM

Last enriched: 3/9/2026, 8:53:03 AM

Last updated: 3/14/2026, 2:34:00 AM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses