Impact
An improper ownership management issue in Moxa Secure Router allows a low‑privileged authenticated user to read a configuration file that contains the hashed password of the administrative account. The vulnerability results in confidentiality loss; the attacker can obtain sensitive authentication material. Integrity and availability are not affected.
Affected Systems
The affected vendors are Moxa, specifically the EDR‑8010 Series and EDR‑9010 Series routers. No version information is supplied by the CNA; users should verify whether their device firmware matches the published vulnerable series.
Risk and Exploitability
The CVSS score of 6 indicates moderate risk. EPSS is reported as less than 1 %, implying a very low probability of exploitation in the wild, and the vulnerability is not listed in CISA KEV. Exploitation is only possible when the configuration file has been exported, a condition that limits the attack surface.
OpenCVE Enrichment