Metrics
Affected Vendors & Products
Solution
Moxa has developed appropriate solutions to address this vulnerability. For details on the affected products and their corresponding solutions, please refer to the Solutions section on our official Security Advisory webpage.
Workaround
No workaround given by the vendor.
Wed, 02 Apr 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 02 Apr 2025 06:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A remote attacker with web administrator privileges can exploit the device’s web interface to execute arbitrary system commands through the NTP settings. Successful exploitation may result in the device entering an infinite reboot loop, leading to a total or partial denial of connectivity for downstream systems that rely on its network services. | |
Title | Command Injection in NTP Setting | |
Weaknesses | CWE-78 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Moxa
Published:
Updated: 2025-04-03T03:26:20.035Z
Reserved: 2025-01-13T06:32:19.363Z
Link: CVE-2025-0415

Updated: 2025-04-02T16:26:43.406Z

Status : Awaiting Analysis
Published: 2025-04-02T07:15:41.720
Modified: 2025-04-02T14:58:07.527
Link: CVE-2025-0415

No data.

No data.