A non-primary administrator user with admin rights to the web interface but without shell access permissions can display configuration of the device including the master admin password. This vulnerability also allows the user to give themselves shell access with the root gid.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.tenable.com/security/research/tra-2025-25 |
![]() ![]() |
History
Fri, 05 Sep 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 27 Aug 2025 11:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Racom
Racom m!dge |
|
Vendors & Products |
Racom
Racom m!dge |
Tue, 26 Aug 2025 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A non-primary administrator user with admin rights to the web interface but without shell access permissions can display configuration of the device including the master admin password. This vulnerability also allows the user to give themselves shell access with the root gid. | |
Title | RACOM M!DGE2 Privilege Escalation via SDK Testing Endpoint | |
Weaknesses | CWE-269 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: tenable
Published:
Updated: 2025-09-05T17:06:09.016Z
Reserved: 2025-04-15T21:53:52.386Z
Link: CVE-2025-36729

Updated: 2025-08-26T17:31:28.507Z

Status : Awaiting Analysis
Published: 2025-08-26T17:15:37.580
Modified: 2025-08-29T16:22:31.970
Link: CVE-2025-36729

No data.

Updated: 2025-08-27T11:21:34Z