Metrics
Affected Vendors & Products
No advisories yet.
Solution
Moxa has developed appropriate solutions to address these vulnerabilities. Please refer to https://www.moxa.com/en/support/product-support/security-advisory/mpsa-257421-cve-2025-1679,-cve-202... https://www.moxa.com/en/support/product-support/security-advisory/mpsa-257421-cve-2025-1679,-cve-2025-1680-stored-cross-site-scripting-(xss)-and-host-header-injection-vulnerabilities-in
Workaround
No workaround given by the vendor.
Fri, 24 Oct 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Moxa
Moxa tn-4500a Moxa tn-5500a Moxa tn-g4500 Moxa tn-g6500 |
|
| Vendors & Products |
Moxa
Moxa tn-4500a Moxa tn-5500a Moxa tn-g4500 Moxa tn-g6500 |
Thu, 23 Oct 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 23 Oct 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An acceptance of extraneous untrusted data with trusted data vulnerability has been identified in Moxa’s Ethernet switches, which allows attackers with administrative privileges to manipulate HTTP Host headers by injecting a specially crafted Host header into HTTP requests sent to an affected device’s web service. This vulnerability is classified as Host Header Injection, where invalid Host headers can manipulate to redirect users, forge links, or phishing attacks. There is no impact to the confidentiality, integrity, and availability of the affected device; no loss of confidentiality, integrity, and availability within any subsequent systems. | |
| Weaknesses | CWE-349 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Moxa
Published:
Updated: 2025-10-23T14:35:30.379Z
Reserved: 2025-02-25T08:08:57.582Z
Link: CVE-2025-1680
Updated: 2025-10-23T14:35:05.185Z
Status : Received
Published: 2025-10-23T14:15:35.813
Modified: 2025-10-23T14:15:35.813
Link: CVE-2025-1680
No data.
OpenCVE Enrichment
Updated: 2025-10-24T10:16:53Z