An Execution with Unnecessary Privileges vulnerability has been identified in Moxa’s network security appliances and routers. A critical authorization flaw in the API allows an authenticated, low-privileged user to create a new administrator account, including accounts with usernames identical to existing users. In certain scenarios, this vulnerability could allow an attacker to gain full administrative control over the affected device, leading to potential account impersonation. While successful exploitation can severely impact the confidentiality, integrity, and availability of the affected device itself, there is no loss of confidentiality or integrity within any subsequent systems.
Advisories

No advisories yet.

Fixes

Solution

Moxa has developed appropriate solutions to address the vulnerability. Please refer to  https://www.moxa.com/en/support/product-support/security-advisory/mpsa-258121-cve-2025-6892,-cve-202... https://www.moxa.com/en/support/product-support/security-advisory/mpsa-258121-cve-2025-6892,-cve-2025-6893,-cve-2025-6894,-cve-2025-6949,-cve-2025-6950-multiple-vulnerabilities-in-netwo


Workaround

No workaround given by the vendor.

History

Fri, 17 Oct 2025 03:30:00 +0000

Type Values Removed Values Added
Description An Execution with Unnecessary Privileges vulnerability has been identified in Moxa’s network security appliances and routers. A critical authorization flaw in the API allows an authenticated, low-privileged user to create a new administrator account, including accounts with usernames identical to existing users. In certain scenarios, this vulnerability could allow an attacker to gain full administrative control over the affected device, leading to potential account impersonation. While successful exploitation can severely impact the confidentiality, integrity, and availability of the affected device itself, there is no loss of confidentiality or integrity within any subsequent systems.
Weaknesses CWE-250
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Moxa

Published:

Updated: 2025-10-17T03:12:02.798Z

Reserved: 2025-07-01T05:10:25.849Z

Link: CVE-2025-6949

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-10-17T04:16:12.620

Modified: 2025-10-17T04:16:12.620

Link: CVE-2025-6949

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.