Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41767: CWE-347 Improper Verification of Cryptographic Signature in MBS UBR-01 Mk II

0
High
VulnerabilityCVE-2025-41767cvecve-2025-41767cwe-347
Published: Mon Mar 09 2026 (03/09/2026, 08:18:17 UTC)
Source: CVE Database V5
Vendor/Project: MBS
Product: UBR-01 Mk II

Description

A high-privileged remote attacker can fully compromise the device by abusing an update signature bypass vulnerability in the wwwupdate.cgi method in the web interface of UBR.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/16/2026, 09:47:01 UTC

Technical Analysis

CVE-2025-41767 identifies a critical vulnerability in the MBS UBR-01 Mk II device, specifically in the wwwupdate.cgi method of its web interface. The root cause is an improper verification of cryptographic signatures (CWE-347) during firmware or software update processes. This flaw allows a remote attacker with high privileges to bypass the signature verification step, effectively permitting the installation of unauthorized or malicious firmware updates. Because the attacker can fully compromise the device, they gain control over its functions, potentially leading to data exfiltration, network pivoting, or denial of service. The vulnerability is remotely exploitable over the network without user interaction, but requires high privileges, indicating that initial access or credentials are prerequisites. The CVSS v3.1 score of 7.2 reflects the high impact on confidentiality, integrity, and availability, combined with the ease of exploitation once privileges are obtained. No public exploits or patches are currently available, increasing the urgency for defensive measures. The device's role in network infrastructure makes this vulnerability particularly dangerous, as compromised devices can serve as footholds for broader attacks.

Potential Impact

The impact of CVE-2025-41767 is substantial for organizations deploying the MBS UBR-01 Mk II device. A successful exploit results in full device compromise, undermining confidentiality by exposing sensitive data, integrity by allowing unauthorized firmware changes, and availability by potentially disabling device functions. This can lead to network disruptions, unauthorized access to internal systems, and the establishment of persistent attacker footholds. Critical infrastructure relying on these devices could face operational outages or sabotage. The requirement for high privileges limits exploitation to insiders or attackers who have already breached initial defenses, but once exploited, the consequences are severe. The lack of patches and known exploits in the wild means organizations must proactively mitigate risks to prevent future attacks. Overall, the vulnerability poses a high risk to network security and operational continuity.

Mitigation Recommendations

Organizations should immediately implement network segmentation and restrict access to the MBS UBR-01 Mk II web interface, limiting it to trusted administrators only. Employ strong authentication mechanisms and monitor access logs for unusual activity related to the wwwupdate.cgi endpoint. Disable remote update functionality if feasible until a vendor patch is released. Use network intrusion detection systems (NIDS) to detect anomalous update attempts or unauthorized firmware uploads. Maintain strict credential management to prevent privilege escalation that could enable exploitation. Engage with the vendor to obtain timely patches or workarounds and apply them promptly once available. Additionally, conduct regular security audits and penetration testing focused on device update mechanisms. Establish incident response plans specific to device compromise scenarios to minimize damage if exploitation occurs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
CERTVDE
Date Reserved
2025-04-16T11:18:45.761Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69ae86d82904315ca3e5dc42

Added to database: 3/9/2026, 8:37:44 AM

Last enriched: 3/16/2026, 9:47:01 AM

Last updated: 4/23/2026, 2:33:27 PM

Views: 91

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses