Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67041: n/a

0
Critical
VulnerabilityCVE-2025-67041cvecve-2025-67041
Published: Wed Mar 11 2026 (03/11/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-67041 is a critical command injection vulnerability in the Lantronix EDS3000PS device firmware version 3. 1. 0. 0R2. The flaw arises from improper sanitization of the 'host' parameter in the TFTP client on the Filesystem Browser page, allowing attackers to escape the intended command context and execute arbitrary commands with root privileges. This vulnerability requires no authentication or user interaction and can be exploited remotely over the network. Successful exploitation compromises confidentiality, integrity, and availability of the affected device, potentially enabling full system takeover. Although no known exploits are currently in the wild, the high CVSS score of 9. 8 indicates severe risk. Organizations using Lantronix EDS3000PS devices should prioritize patching or applying mitigations once available.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/18/2026, 19:29:00 UTC

Technical Analysis

CVE-2025-67041 is a critical remote command injection vulnerability identified in the Lantronix EDS3000PS device firmware version 3.1.0.0R2. The vulnerability stems from insufficient input validation and sanitization of the 'host' parameter used by the TFTP client within the Filesystem Browser web interface. An attacker can craft malicious input to break out of the intended command context, injecting arbitrary shell commands that execute with root privileges on the device. This flaw is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), CWE-288 (Authentication Bypass Using an Alternate Path or Channel), and CWE-620 (Unverified Password Change). The exploit requires no authentication or user interaction, making it remotely exploitable over the network. The device’s web interface accepts the 'host' parameter, which is passed directly to a system command without proper escaping or validation, enabling command injection. The impact includes full system compromise, allowing attackers to manipulate device configurations, intercept or alter data, disrupt device operations, or use the device as a foothold for lateral movement within a network. No patches or official fixes are currently published, and no exploits have been observed in the wild yet, but the vulnerability’s critical severity and ease of exploitation make it a high-priority risk for affected organizations.

Potential Impact

The impact of CVE-2025-67041 is severe due to the ability to execute arbitrary commands with root privileges remotely and without authentication. Organizations using Lantronix EDS3000PS devices risk complete device takeover, which can lead to unauthorized access to sensitive data, disruption of device functionality, and potential pivoting to other internal systems. This can compromise the confidentiality, integrity, and availability of critical infrastructure, especially in industrial, manufacturing, or network management environments where these devices are commonly deployed. Attackers could deploy malware, exfiltrate data, or cause denial of service conditions. The vulnerability’s exploitation could also undermine trust in network management and monitoring systems, leading to broader operational and security failures.

Mitigation Recommendations

Until an official patch is released, organizations should implement strict network segmentation and access controls to limit exposure of the Lantronix EDS3000PS management interface to trusted administrators only. Employ firewall rules to restrict inbound traffic to the device’s web interface, ideally allowing access only from secure management networks or VPNs. Monitor device logs and network traffic for unusual command execution patterns or unexpected TFTP client activity. Disable or restrict TFTP client functionality if not required. Consider deploying web application firewalls (WAFs) or intrusion detection/prevention systems (IDS/IPS) with custom rules to detect and block command injection attempts targeting the 'host' parameter. Maintain an inventory of affected devices and prepare for rapid patch deployment once a fix becomes available. Educate administrators on the risks of exposing device management interfaces to untrusted networks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69b1988f2f860ef9433d1500

Added to database: 3/11/2026, 4:30:07 PM

Last enriched: 3/18/2026, 7:29:00 PM

Last updated: 4/28/2026, 5:42:10 AM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses