Metrics
Affected Vendors & Products
No advisories yet.
Solution
Moxa has developed appropriate solutions to address the vulnerability. Please refer to https://www.moxa.com/en/support/product-support/security-advisory/mpsa-258121-cve-2025-6892,-cve-202... https://www.moxa.com/en/support/product-support/security-advisory/mpsa-258121-cve-2025-6892,-cve-2025-6893,-cve-2025-6894,-cve-2025-6949,-cve-2025-6950-multiple-vulnerabilities-in-netwo
Workaround
No workaround given by the vendor.
Fri, 17 Oct 2025 03:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An Execution with Unnecessary Privileges vulnerability has been identified in Moxa’s network security appliances and routers. A critical authorization flaw in the API allows an authenticated, low-privileged user to create a new administrator account, including accounts with usernames identical to existing users. In certain scenarios, this vulnerability could allow an attacker to gain full administrative control over the affected device, leading to potential account impersonation. While successful exploitation can severely impact the confidentiality, integrity, and availability of the affected device itself, there is no loss of confidentiality or integrity within any subsequent systems. | |
Weaknesses | CWE-250 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Moxa
Published:
Updated: 2025-10-17T03:12:02.798Z
Reserved: 2025-07-01T05:10:25.849Z
Link: CVE-2025-6949

No data.

Status : Received
Published: 2025-10-17T04:16:12.620
Modified: 2025-10-17T04:16:12.620
Link: CVE-2025-6949

No data.

No data.