Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41766: CWE-787 Out-of-bounds Write in MBS UBR-01 Mk II

0
High
VulnerabilityCVE-2025-41766cvecve-2025-41766cwe-787
Published: Mon Mar 09 2026 (03/09/2026, 08:18:03 UTC)
Source: CVE Database V5
Vendor/Project: MBS
Product: UBR-01 Mk II

Description

CVE-2025-41766 is a high-severity stack-based buffer overflow vulnerability in the MBS UBR-01 Mk II device. A low-privileged remote attacker can exploit this flaw by sending a specially crafted HTTP POST request using the ubr-network method, leading to out-of-bounds memory writes. Successful exploitation results in full device compromise, affecting confidentiality, integrity, and availability. The vulnerability requires no user interaction but does require low-level privileges and network access. No public exploits are known yet, and no patches have been released. Organizations using the UBR-01 Mk II should prioritize mitigation to prevent potential future exploitation. Countries with significant deployments of MBS networking equipment, especially in critical infrastructure, are at higher risk.

AI-Powered Analysis

AILast updated: 03/09/2026, 08:52:32 UTC

Technical Analysis

CVE-2025-41766 is a stack-based buffer overflow vulnerability classified under CWE-787 affecting the MBS UBR-01 Mk II device. The flaw arises when the device processes HTTP POST requests using the ubr-network method, where insufficient bounds checking allows an attacker to write beyond the allocated stack buffer. This vulnerability can be triggered remotely by an attacker with low privileges, without requiring user interaction, making it highly exploitable over the network. The overflow can overwrite critical control data on the stack, enabling arbitrary code execution or complete device takeover. The vulnerability impacts all versions identified as 0.0.0, suggesting early or default firmware versions. The CVSS 3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no user interaction needed. Although no public exploits are currently known, the lack of available patches increases the urgency for defensive measures. The vulnerability could be leveraged to disrupt network operations, intercept or manipulate sensitive data, or establish persistent footholds within affected environments.

Potential Impact

The vulnerability allows remote attackers to gain full control over the MBS UBR-01 Mk II device, potentially leading to complete compromise of network infrastructure where these devices are deployed. This can result in unauthorized data access, manipulation, or deletion, disruption of network services, and use of compromised devices as pivot points for further attacks. Critical infrastructure relying on these devices could face operational outages or data breaches. The broad impact on confidentiality, integrity, and availability makes this a significant threat to organizations using this product, especially in sectors such as telecommunications, government, and enterprise networks. The ease of exploitation and network accessibility exacerbate the risk, potentially enabling widespread attacks if exploited in the wild.

Mitigation Recommendations

Organizations should immediately identify all MBS UBR-01 Mk II devices within their networks and restrict network access to trusted sources only, using network segmentation and firewall rules to limit exposure to untrusted networks. Employ intrusion detection and prevention systems (IDS/IPS) to monitor for anomalous HTTP POST requests targeting the ubr-network method. Since no patches are currently available, consider deploying virtual patching via web application firewalls (WAF) or network-level filters to block suspicious payloads. Regularly audit device firmware versions and subscribe to vendor advisories for updates. Implement strict access controls and monitor device logs for signs of exploitation attempts. Where possible, isolate vulnerable devices from critical network segments until a vendor patch is released. Additionally, conduct penetration testing to validate the effectiveness of mitigations and ensure no other attack vectors exist.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
CERTVDE
Date Reserved
2025-04-16T11:18:45.761Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69ae86d82904315ca3e5dc3f

Added to database: 3/9/2026, 8:37:44 AM

Last enriched: 3/9/2026, 8:52:32 AM

Last updated: 3/9/2026, 10:16:07 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses