Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41764: CWE-862 Missing Authorization in MBS UBR-01 Mk II

0
Critical
VulnerabilityCVE-2025-41764cvecve-2025-41764cwe-862
Published: Mon Mar 09 2026 (03/09/2026, 08:17:45 UTC)
Source: CVE Database V5
Vendor/Project: MBS
Product: UBR-01 Mk II

Description

Due to insufficient authorization enforcement, an unauthorized remote attacker can exploit the wwwupdate.cgi endpoint to upload and apply arbitrary updates.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/16/2026, 09:42:36 UTC

Technical Analysis

CVE-2025-41764 is a critical security vulnerability identified in the MBS UBR-01 Mk II device, specifically related to insufficient authorization enforcement on the wwwupdate.cgi endpoint. This endpoint is responsible for handling update uploads and application processes. Due to the missing authorization checks (CWE-862), an unauthenticated remote attacker can directly upload and apply arbitrary updates to the device. The vulnerability does not require any privileges or user interaction, making it highly exploitable over the network. The CVSS v3.1 base score of 9.1 reflects the ease of exploitation (network attack vector, low attack complexity), lack of required privileges, and the severe impact on integrity and availability, though confidentiality impact is rated none. Successful exploitation could allow attackers to install malicious firmware or software, leading to persistent compromise, disruption of device functionality, or use of the device as a foothold for further network attacks. The affected version is listed as 0.0.0, which likely indicates all current versions or an unspecified version baseline. No patches or known exploits are currently documented, but the vulnerability's nature demands urgent attention. The vulnerability was reserved in April 2025 and published in March 2026, indicating a recent discovery and disclosure timeline.

Potential Impact

The impact of CVE-2025-41764 on organizations worldwide is significant due to the critical nature of the vulnerability. Exploitation can lead to complete compromise of device integrity and availability, allowing attackers to deploy malicious updates that could disrupt network operations or create persistent backdoors. This can affect network reliability, data flow, and potentially enable lateral movement within corporate or critical infrastructure networks. Organizations relying on MBS UBR-01 Mk II devices for network routing or security functions may face operational outages, data loss, or espionage risks. The lack of authentication requirements and remote exploitability increases the attack surface, making it attractive for threat actors. Although no exploits are currently known in the wild, the vulnerability’s characteristics suggest it could be weaponized quickly once exploit code is developed. This poses a risk to sectors such as telecommunications, government networks, critical infrastructure, and enterprises using these devices in their network infrastructure.

Mitigation Recommendations

To mitigate CVE-2025-41764, organizations should implement the following specific measures: 1) Immediately restrict network access to the wwwupdate.cgi endpoint by applying firewall rules or access control lists to limit update interface exposure only to trusted management networks or IP addresses. 2) Employ network segmentation to isolate affected devices from general user or internet-facing networks to reduce attack surface. 3) Monitor network traffic and device logs for any unauthorized or anomalous update attempts or unusual activity on the update endpoint. 4) Engage with MBS vendor support to obtain patches or firmware updates addressing the authorization flaw as soon as they become available. 5) If patches are unavailable, consider disabling remote update functionality temporarily or implementing manual update procedures with strict physical or network controls. 6) Conduct regular security audits and penetration tests focusing on device management interfaces to detect similar authorization weaknesses. 7) Educate network administrators about the risk and ensure secure configuration management practices are followed. These steps go beyond generic advice by focusing on access restriction, monitoring, and vendor engagement specific to this vulnerability’s vector.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
CERTVDE
Date Reserved
2025-04-16T11:18:45.760Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69ae86d82904315ca3e5dc39

Added to database: 3/9/2026, 8:37:44 AM

Last enriched: 3/16/2026, 9:42:36 AM

Last updated: 4/28/2026, 7:21:57 AM

Views: 145

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses