Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-27005 | A non-primary administrator user with admin rights to the web interface but without shell access permissions can display configuration of the device including the master admin password. This vulnerability also allows the user to give themselves shell access with the root gid. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://www.tenable.com/security/research/tra-2025-25 |
|
Fri, 05 Sep 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 27 Aug 2025 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Racom
Racom m!dge |
|
| Vendors & Products |
Racom
Racom m!dge |
Tue, 26 Aug 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A non-primary administrator user with admin rights to the web interface but without shell access permissions can display configuration of the device including the master admin password. This vulnerability also allows the user to give themselves shell access with the root gid. | |
| Title | RACOM M!DGE2 Privilege Escalation via SDK Testing Endpoint | |
| Weaknesses | CWE-269 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: tenable
Published:
Updated: 2025-09-05T17:06:09.016Z
Reserved: 2025-04-15T21:53:52.386Z
Link: CVE-2025-36729
Updated: 2025-08-26T17:31:28.507Z
Status : Awaiting Analysis
Published: 2025-08-26T17:15:37.580
Modified: 2025-08-29T16:22:31.970
Link: CVE-2025-36729
No data.
OpenCVE Enrichment
Updated: 2025-08-27T11:21:34Z
EUVD