Impact
An authenticated attacker can exploit a missing sanitization check in the Log Info page of Lantronix EDS5000 firmware 2.1.0.0 R3, allowing injection of arbitrary OS commands that execute with root privileges. This flaw is a classic example of CWE-94, giving the attacker the ability to run any command on the underlying operating system, fully compromising confidentiality, integrity, and availability of the device.
Affected Systems
Affected products include Lantronix EDS5008, EDS5016, and EDS5032 running firmware version 2.1.0.0 r3. The vulnerability manifests on the Log Info page, which requires authentication; therefore, only authenticated users with access to this page can trigger the attack. No other firmware versions are identified as vulnerable in the provided data.
Risk and Exploitability
The CVSS score of 8.8 categorizes this flaw as high severity, while an EPSS score of less than 1% suggests that active exploitation is currently rare. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires legitimate credentials with access to the Log Info page, indicating that the attack vector is internal or local with authenticated privileges. The impact is complete system compromise due to root‑level command execution.
OpenCVE Enrichment