An authenticated remote attacker with web read-only privileges can exploit the vulnerable API to inject malicious input. Successful exploitation may cause the device to reboot, disrupting normal operations and causing a temporary denial of service.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
NPort 6100-G2/6200-G2 Series * Update to firmware v1.1.0 or later
Workaround
No workaround given by the vendor.
Wed, 31 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 31 Dec 2025 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The NPort 6100-G2/6200-G2 Series is affected by a high-severity vulnerability (CVE-2025-2026) that allows remote attackers to execute a null byte injection through the device’s web API. This may lead to an unexpected device reboot and result in a denial-of-service (DoS) condition. An authenticated remote attacker with web read-only privileges can exploit the vulnerable API to inject malicious input. Successful exploitation may cause the device to reboot, disrupting normal operations and causing a temporary denial of service. | |
| Weaknesses | CWE-170 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Moxa
Published:
Updated: 2025-12-31T16:07:29.435Z
Reserved: 2025-03-06T02:21:13.887Z
Link: CVE-2025-2026
Updated: 2025-12-31T16:07:26.941Z
Status : Awaiting Analysis
Published: 2025-12-31T08:15:45.460
Modified: 2025-12-31T20:42:15.637
Link: CVE-2025-2026
No data.
OpenCVE Enrichment
No data.