Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67035: n/a

0
Critical
VulnerabilityCVE-2025-67035cvecve-2025-67035
Published: Wed Mar 11 2026 (03/11/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Lantronix EDS5000 2.1.0.0R3. The SSH Client and SSH Server pages are affected by multiple OS injection vulnerabilities due to missing sanitization of input parameters. An attacker can inject arbitrary commands in delete actions of various objects, such as server keys, users, and known hosts. Commands are executed with root privileges.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/18/2026, 19:11:42 UTC

Technical Analysis

CVE-2025-67035 is a critical vulnerability discovered in Lantronix EDS5000 firmware version 2.1.0.0R3. The issue arises from improper input sanitization in the web interface's SSH Client and SSH Server management pages. Specifically, when performing delete operations on various objects such as server keys, user accounts, and known hosts, the input parameters are vulnerable to OS command injection (CWE-94). This allows an attacker to craft malicious input that injects arbitrary shell commands executed with root privileges on the device. The vulnerability requires no authentication and no user interaction, making it highly exploitable remotely over the network. The CVSS v3.1 base score is 9.8, reflecting the critical impact on confidentiality, integrity, and availability. The root-level command execution can lead to complete device takeover, data theft, network pivoting, or persistent backdoors. Despite the severity, no patches or public exploits have been reported yet. The affected product, Lantronix EDS5000, is an embedded device often used for secure device management and remote access in enterprise environments, increasing the risk profile. The vulnerability was reserved in December 2025 and published in March 2026, indicating recent discovery and disclosure.

Potential Impact

The impact of CVE-2025-67035 is severe for organizations deploying Lantronix EDS5000 devices. Successful exploitation grants attackers root-level control over the device, enabling them to execute arbitrary commands, manipulate system configurations, exfiltrate sensitive data, or disrupt network operations. Since these devices often serve as gateways or management consoles for critical infrastructure, compromise can lead to lateral movement within corporate networks, undermining broader security postures. The lack of authentication and user interaction requirements means attackers can remotely exploit the vulnerability without prior access, increasing the attack surface. Potential consequences include full device compromise, network breaches, data loss, and operational downtime. Organizations relying on these devices for secure remote access or device management face heightened risks of espionage, sabotage, or ransomware deployment.

Mitigation Recommendations

Given the absence of available patches, organizations should immediately implement compensating controls. These include isolating affected Lantronix EDS5000 devices on segmented networks with strict access controls and firewall rules limiting inbound connections to trusted sources only. Disable or restrict web interface access if possible, especially the SSH Client and Server management pages. Monitor network traffic and device logs for unusual command execution patterns or unauthorized access attempts. Employ network intrusion detection systems (NIDS) with signatures targeting command injection attempts. If feasible, replace or upgrade affected devices to versions confirmed to be patched once available. Additionally, enforce strong network segmentation to prevent attackers from pivoting from compromised devices to critical infrastructure. Regularly review and audit device configurations and access permissions to minimize exposure. Engage with Lantronix support for updates and advisories. Finally, prepare incident response plans specific to embedded device compromise scenarios.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69b1988f2f860ef9433d14e7

Added to database: 3/11/2026, 4:30:07 PM

Last enriched: 3/18/2026, 7:11:42 PM

Last updated: 4/28/2026, 7:21:16 AM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses