Impact
A vulnerability was found in Advantech WISE‑6610 version 1.2.1_20251110 that allows remote attackers to inject arbitrary operating‑system commands. An attacker can manipulate the delete_file argument of the /cgi-bin/luci/admin/openvpn_apply CGI script to execute arbitrary commands on the device. This type of vector can compromise the confidentiality, integrity, and availability of the device and any connected networks.
Affected Systems
Advantech WISE‑6610 devices running firmware version 1.2.1_20251110 are affected. The vulnerability resides in the Background Management component, specifically the openvpn_apply CGI script located at /cgi-bin/luci/admin.
Risk and Exploitability
The CVSS base score of 8.6 places the vulnerability in the High severity range, and the EPSS score of less than 1 % indicates that exploitation is currently expected to be rare, though the public exploit makes it possible. The vulnerability is not listed in the CISA KEV catalog. Attackers can exploit the flaw remotely by sending a crafted HTTP request to the vulnerable script. No local privilege escalation is required; the flaw can be triggered by any external network user with access to the device’s web interface. If exploited, the attacker could run arbitrary commands, potentially taking full control of the device.
OpenCVE Enrichment