Description
A low-privileged remote attacker can trigger a stack-based buffer overflow via a crafted HTTP POST request using the ubr-network method resulting in full device compromise.
Published: 2026-03-09
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Wed, 11 Mar 2026 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Mbs-solutions
Mbs-solutions ubr-01 Mk Ii
Mbs-solutions ubr-02
Mbs-solutions ubr-lon
Mbs-solutions universal Bacnet Router Firmware
CPEs cpe:2.3:h:mbs-solutions:ubr-01_mk_ii:-:*:*:*:*:*:*:*
cpe:2.3:h:mbs-solutions:ubr-02:-:*:*:*:*:*:*:*
cpe:2.3:h:mbs-solutions:ubr-lon:-:*:*:*:*:*:*:*
cpe:2.3:o:mbs-solutions:universal_bacnet_router_firmware:*:*:*:*:*:*:*:*
Vendors & Products Mbs-solutions
Mbs-solutions ubr-01 Mk Ii
Mbs-solutions ubr-02
Mbs-solutions ubr-lon
Mbs-solutions universal Bacnet Router Firmware

Tue, 10 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Mbs
Mbs ubr-01 Mk Ii
Mbs ubr-02
Mbs ubr-lon
Vendors & Products Mbs
Mbs ubr-01 Mk Ii
Mbs ubr-02
Mbs ubr-lon

Mon, 09 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 08:30:00 +0000

Type Values Removed Values Added
Description A low-privileged remote attacker can trigger a stack-based buffer overflow via a crafted HTTP POST request using the ubr-network method resulting in full device compromise.
Title Stack buffer overflow on parsing web request
Weaknesses CWE-787
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Mbs Ubr-01 Mk Ii Ubr-02 Ubr-lon
Mbs-solutions Ubr-01 Mk Ii Ubr-02 Ubr-lon Universal Bacnet Router Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2026-03-09T20:14:03.688Z

Reserved: 2025-04-16T11:18:45.761Z

Link: CVE-2025-41766

cve-icon Vulnrichment

Updated: 2026-03-09T20:04:04.854Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-09T09:16:01.173

Modified: 2026-03-11T18:27:32.050

Link: CVE-2025-41766

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-10T14:09:59Z

Weaknesses