execute arbitrary OS commands to disclose, tamper with, destroy or
delete information in Mitsubishi Electric smartRTU, or cause a denial-of
service condition on the product.
Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
Mitsubishi Electric Europe B.V. recommends that users take note of the following mitigation measures to minimize the risk of exploiting this vulnerability: * Use a firewall or virtual private network (VPN), etc. to prevent unauthorized access when Internet access is required. * Use within a LAN and block access from untrusted networks and hosts through firewalls. * Use web application firewall (WAF) to prevent to filter, monitor and block any malicious HTTP/HTTPS traffic. * Allow web client access from trusted networks only. For more information, please see Mitsubishi Electric Europe MEU_PSIRT_2025-3128 https://emea.mitsubishielectric.com/fa/products/quality/quality-news-information under the "Vulnerability Information" section.
Sat, 23 Aug 2025 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Mitsubishielectric
Mitsubishielectric smartrtu |
|
Vendors & Products |
Mitsubishielectric
Mitsubishielectric smartrtu |
Fri, 22 Aug 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
ssvc
|
Thu, 21 Aug 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 21 Aug 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A remote unauthenticated attacker who has bypassed authentication could execute arbitrary OS commands to disclose, tamper with, destroy or delete information in Mitsubishi Electric smartRTU, or cause a denial-of service condition on the product. | |
Title | Mitsubishi Electric Europe smartRTU OS Command Injection | |
Weaknesses | CWE-78 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-08-22T15:50:28.090Z
Reserved: 2025-04-02T15:44:23.734Z
Link: CVE-2025-3128

Updated: 2025-08-21T20:08:00.800Z

Status : Awaiting Analysis
Published: 2025-08-21T20:15:32.840
Modified: 2025-08-22T18:08:51.663
Link: CVE-2025-3128

No data.

Updated: 2025-08-23T11:53:20Z