CVE-2025-41765: CWE-862 Missing Authorization in MBS UBR-01 Mk II
CVE-2025-41765 is a critical vulnerability in the MBS UBR-01 Mk II device caused by missing authorization enforcement on the wwwupload. cgi endpoint. An unauthenticated remote attacker can exploit this flaw to upload and apply arbitrary data, including sensitive items such as HTTPS certificates, system backups, and BACnet/SC server keys. This can lead to full compromise of device integrity and availability without requiring any user interaction. The vulnerability has a CVSS 3. 1 score of 9. 1, indicating high exploitability and severe impact. No known exploits are currently reported in the wild. Organizations using this device should urgently implement strict access controls and monitor for suspicious uploads to mitigate risk. The threat is particularly relevant to industries relying on BACnet/SC protocols and critical infrastructure sectors worldwide.
AI Analysis
Technical Summary
CVE-2025-41765 is a critical security vulnerability identified in the MBS UBR-01 Mk II device, stemming from CWE-862: Missing Authorization. The flaw exists in the wwwupload.cgi endpoint, which lacks proper authorization checks, allowing an unauthenticated remote attacker to upload arbitrary data to the device. This includes highly sensitive data types such as contact images, HTTPS certificates, system backups used for restoration, server peer configurations, and BACnet/SC server certificates and keys. Exploitation of this vulnerability can lead to unauthorized modification or replacement of critical device files, potentially enabling attackers to manipulate device behavior, intercept or spoof communications, or cause denial of service. The vulnerability is remotely exploitable over the network without any authentication or user interaction, as reflected in its CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:N). The CVSS base score of 9.1 classifies it as critical, highlighting the severe impact on integrity and availability, though confidentiality impact is rated none. The vulnerability was published in March 2026, with no patches currently available and no known exploits in the wild. The device’s role in BACnet/SC environments suggests that exploitation could have significant implications for building automation and industrial control systems. The lack of authorization enforcement indicates a fundamental security design flaw, necessitating urgent remediation efforts.
Potential Impact
The impact of CVE-2025-41765 is severe for organizations deploying the MBS UBR-01 Mk II, especially those in critical infrastructure sectors such as building automation, industrial control, and facilities management that utilize BACnet/SC protocols. Successful exploitation allows attackers to upload and apply arbitrary data, including system backups and cryptographic keys, which can lead to complete device compromise. This could result in unauthorized control over device functions, manipulation of network communications, and disruption of services, potentially causing operational downtime and safety risks. The ability to replace HTTPS certificates and server keys also opens avenues for man-in-the-middle attacks and persistent unauthorized access. Since no authentication or user interaction is required, the attack surface is broad, increasing the likelihood of exploitation if devices are exposed to untrusted networks. The absence of patches further elevates risk, making mitigation challenging. Organizations worldwide relying on these devices face potential confidentiality, integrity, and availability breaches, with cascading effects on dependent systems and processes.
Mitigation Recommendations
Given the absence of an official patch, organizations should immediately implement compensating controls to mitigate this vulnerability. These include restricting network access to the MBS UBR-01 Mk II devices by placing them behind firewalls or network segmentation to limit exposure of the wwwupload.cgi endpoint to trusted management networks only. Employ strict access control lists (ACLs) and VPNs for remote management to prevent unauthorized external access. Monitor device logs and network traffic for unusual upload activity or unauthorized configuration changes. If possible, disable or restrict the wwwupload.cgi endpoint until a patch is available. Conduct regular backups of device configurations and system states to enable recovery from potential compromise. Engage with the vendor for updates and apply patches promptly once released. Additionally, perform security audits and penetration testing focused on device management interfaces to identify other potential weaknesses. Educate operational technology (OT) and IT teams about this vulnerability to ensure rapid detection and response.
Affected Countries
United States, Germany, France, United Kingdom, Japan, South Korea, China, Canada, Australia, Netherlands, Sweden, Singapore
CVE-2025-41765: CWE-862 Missing Authorization in MBS UBR-01 Mk II
Description
CVE-2025-41765 is a critical vulnerability in the MBS UBR-01 Mk II device caused by missing authorization enforcement on the wwwupload. cgi endpoint. An unauthenticated remote attacker can exploit this flaw to upload and apply arbitrary data, including sensitive items such as HTTPS certificates, system backups, and BACnet/SC server keys. This can lead to full compromise of device integrity and availability without requiring any user interaction. The vulnerability has a CVSS 3. 1 score of 9. 1, indicating high exploitability and severe impact. No known exploits are currently reported in the wild. Organizations using this device should urgently implement strict access controls and monitor for suspicious uploads to mitigate risk. The threat is particularly relevant to industries relying on BACnet/SC protocols and critical infrastructure sectors worldwide.
AI-Powered Analysis
Technical Analysis
CVE-2025-41765 is a critical security vulnerability identified in the MBS UBR-01 Mk II device, stemming from CWE-862: Missing Authorization. The flaw exists in the wwwupload.cgi endpoint, which lacks proper authorization checks, allowing an unauthenticated remote attacker to upload arbitrary data to the device. This includes highly sensitive data types such as contact images, HTTPS certificates, system backups used for restoration, server peer configurations, and BACnet/SC server certificates and keys. Exploitation of this vulnerability can lead to unauthorized modification or replacement of critical device files, potentially enabling attackers to manipulate device behavior, intercept or spoof communications, or cause denial of service. The vulnerability is remotely exploitable over the network without any authentication or user interaction, as reflected in its CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:N). The CVSS base score of 9.1 classifies it as critical, highlighting the severe impact on integrity and availability, though confidentiality impact is rated none. The vulnerability was published in March 2026, with no patches currently available and no known exploits in the wild. The device’s role in BACnet/SC environments suggests that exploitation could have significant implications for building automation and industrial control systems. The lack of authorization enforcement indicates a fundamental security design flaw, necessitating urgent remediation efforts.
Potential Impact
The impact of CVE-2025-41765 is severe for organizations deploying the MBS UBR-01 Mk II, especially those in critical infrastructure sectors such as building automation, industrial control, and facilities management that utilize BACnet/SC protocols. Successful exploitation allows attackers to upload and apply arbitrary data, including system backups and cryptographic keys, which can lead to complete device compromise. This could result in unauthorized control over device functions, manipulation of network communications, and disruption of services, potentially causing operational downtime and safety risks. The ability to replace HTTPS certificates and server keys also opens avenues for man-in-the-middle attacks and persistent unauthorized access. Since no authentication or user interaction is required, the attack surface is broad, increasing the likelihood of exploitation if devices are exposed to untrusted networks. The absence of patches further elevates risk, making mitigation challenging. Organizations worldwide relying on these devices face potential confidentiality, integrity, and availability breaches, with cascading effects on dependent systems and processes.
Mitigation Recommendations
Given the absence of an official patch, organizations should immediately implement compensating controls to mitigate this vulnerability. These include restricting network access to the MBS UBR-01 Mk II devices by placing them behind firewalls or network segmentation to limit exposure of the wwwupload.cgi endpoint to trusted management networks only. Employ strict access control lists (ACLs) and VPNs for remote management to prevent unauthorized external access. Monitor device logs and network traffic for unusual upload activity or unauthorized configuration changes. If possible, disable or restrict the wwwupload.cgi endpoint until a patch is available. Conduct regular backups of device configurations and system states to enable recovery from potential compromise. Engage with the vendor for updates and apply patches promptly once released. Additionally, perform security audits and penetration testing focused on device management interfaces to identify other potential weaknesses. Educate operational technology (OT) and IT teams about this vulnerability to ensure rapid detection and response.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- CERTVDE
- Date Reserved
- 2025-04-16T11:18:45.760Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69ae86d82904315ca3e5dc3c
Added to database: 3/9/2026, 8:37:44 AM
Last enriched: 3/9/2026, 8:52:48 AM
Last updated: 3/9/2026, 10:53:21 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.