Metrics
Affected Vendors & Products
No advisories yet.
Solution
Moxa has developed appropriate solutions to address the vulnerability. Please refer to: https://www.moxa.com/en/support/product-support/security-advisory/mpsa-258121-cve-2025-6892,-cve-202... https://www.moxa.com/en/support/product-support/security-advisory/mpsa-258121-cve-2025-6892,-cve-2025-6893,-cve-2025-6894,-cve-2025-6949,-cve-2025-6950-multiple-vulnerabilities-in-netwo
Workaround
No workaround given by the vendor.
Fri, 17 Oct 2025 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An Execution with Unnecessary Privileges vulnerability has been identified in Moxa’s network security appliances and routers. A flaw in broken access control has been identified in the /api/v1/setting/data endpoint of the affected device. This flaw allows a low-privileged authenticated user to call the API without the required permissions, thereby gaining the ability to access or modify system configuration data. Successful exploitation may lead to privilege escalation, allowing the attacker to access or modify sensitive system settings. While the overall impact is high, there is no loss of confidentiality or integrity within any subsequent systems. | |
Weaknesses | CWE-250 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Moxa
Published:
Updated: 2025-10-17T02:17:07.319Z
Reserved: 2025-06-28T15:51:37.684Z
Link: CVE-2025-6893

No data.

Status : Received
Published: 2025-10-17T03:15:36.380
Modified: 2025-10-17T03:15:36.380
Link: CVE-2025-6893

No data.

No data.