Description
3onedata modbus gateway device model GW1101-1D(RS-485)-TB-P (hardware version V2.2.0) allows authenticated users to execute arbitrary shell commands in the context of the root user by providing payload in the "IP address" field of the diagnosis test tools.
This issue has been resolved in firmware version 3.0.59B2024080600R4353
Published: 2026-05-04
Score: 9.3 Critical
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

3onedata's GW1101-1D(RS-485)-TB-P modbus gateway contains a command injection flaw in the diagnosis test tools. An attacker who can authenticate to the gateway and provide malicious input in the IP address field can cause the device to run arbitrary shell commands as the root user. The flaw gives the attacker system-level privileges and the ability to execute any commands on the device.

Affected Systems

The vulnerability applies to 3onedata GW1101-1D(RS-485)-TB-P modbus gateways with hardware version V2.2.0 that are running firmware versions older than 3.0.59B2024080600R4353. Devices updated to firmware 3.0.59B2024080600R4353 or later are not affected.

Risk and Exploitability

The flaw has a CVSS score of 9.3, indicating critical severity. It requires authenticated access to the diagnostic test tools, meaning only users with valid credentials may exploit it. EPSS data is unavailable, and the vulnerability is not listed in CISA KEV. Given its high severity and the potential for root-level command execution, prompt remediation is advised.

Generated by OpenCVE AI on May 4, 2026 at 16:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the gateway firmware to version 3.0.59B2024080600R4353 or later.
  • Disable or restrict access to the diagnosis test tools, especially the IP address input field, limiting use to trusted administrators.
  • Apply network segmentation or firewall rules to restrict management-interface access to a trusted internal subnet.

Generated by OpenCVE AI on May 4, 2026 at 16:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 04 May 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared 3onedata
3onedata gw1101-1d(rs-485)-tb-p
Vendors & Products 3onedata
3onedata gw1101-1d(rs-485)-tb-p

Mon, 04 May 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 04 May 2026 15:00:00 +0000

Type Values Removed Values Added
Description 3onedata modbus gateway device model GW1101-1D(RS-485)-TB-P (hardware version V2.2.0) allows authenticated users to execute arbitrary shell commands in the context of the root user by providing payload in the "IP address" field of the diagnosis test tools. This issue has been resolved in firmware version 3.0.59B2024080600R4353
Title Shell command injection in 3onedata GW1101-1D(RS-485)-TB-P modbus gateway
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


Subscriptions

3onedata Gw1101-1d(rs-485)-tb-p
cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-PL

Published:

Updated: 2026-05-04T15:28:56.851Z

Reserved: 2025-11-24T14:44:56.542Z

Link: CVE-2025-13605

cve-icon Vulnrichment

Updated: 2026-05-04T15:28:44.757Z

cve-icon NVD

Status : Received

Published: 2026-05-04T15:16:02.630

Modified: 2026-05-04T15:16:02.630

Link: CVE-2025-13605

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-04T19:44:08Z

Weaknesses