// For flags

CVE-2025-0676

Commend Injection Leading to Privilege Escalation

Severity Score

8.6
*CVSS v4

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

This vulnerability involves command injection in tcpdump within Moxa products, enabling an authenticated attacker with console access to exploit improper input validation to inject and execute systems commands. Successful exploitation could result in privilege escalation, allowing the attacker to gain root shell access and maintain persistent control over the device, potentially disrupting network services and affecting the availability of downstream systems that rely on its connectivity.

*Credits: Rex Weng from Moxa's Product Security Center
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Attack Requirements
None
Privileges Required
High
User Interaction
None
System
Vulnerable | Subsequent
Confidentiality
High
None
Integrity
High
None
Availability
High
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2025-01-23 CVE Reserved
  • 2025-04-02 CVE Published
  • 2025-04-03 CVE Updated
  • 2025-06-09 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
  • CAPEC-137: Parameter Injection
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Moxa
Search vendor "Moxa"
EDF-G1002-BP Series
Search vendor "Moxa" for product "EDF-G1002-BP Series"
>= 1.0 <= 3.14
Search vendor "Moxa" for product "EDF-G1002-BP Series" and version " >= 1.0 <= 3.14"
en
Affected
Moxa
Search vendor "Moxa"
EDR-810 Series
Search vendor "Moxa" for product "EDR-810 Series"
>= 1.0.0 <= 5.12.39
Search vendor "Moxa" for product "EDR-810 Series" and version " >= 1.0.0 <= 5.12.39"
en
Affected
Moxa
Search vendor "Moxa"
EDR-8010 Series
Search vendor "Moxa" for product "EDR-8010 Series"
>= 1.0 <= 3.14
Search vendor "Moxa" for product "EDR-8010 Series" and version " >= 1.0 <= 3.14"
en
Affected
Moxa
Search vendor "Moxa"
EDR-G9004 Series
Search vendor "Moxa" for product "EDR-G9004 Series"
>= 1.0 <= 3.14
Search vendor "Moxa" for product "EDR-G9004 Series" and version " >= 1.0 <= 3.14"
en
Affected
Moxa
Search vendor "Moxa"
EDR-G9010 Series
Search vendor "Moxa" for product "EDR-G9010 Series"
>= 1.0 <= 3.14
Search vendor "Moxa" for product "EDR-G9010 Series" and version " >= 1.0 <= 3.14"
en
Affected
Moxa
Search vendor "Moxa"
OnCell G4302-LTE4 Series
Search vendor "Moxa" for product "OnCell G4302-LTE4 Series"
>= 1.0 <= 3.14
Search vendor "Moxa" for product "OnCell G4302-LTE4 Series" and version " >= 1.0 <= 3.14"
en
Affected
Moxa
Search vendor "Moxa"
TN-4900 Series
Search vendor "Moxa" for product "TN-4900 Series"
>= 1.0 <= 3.14
Search vendor "Moxa" for product "TN-4900 Series" and version " >= 1.0 <= 3.14"
en
Affected
Moxa
Search vendor "Moxa"
NAT-102 Series
Search vendor "Moxa" for product "NAT-102 Series"
>= 1.0 <= 3.15
Search vendor "Moxa" for product "NAT-102 Series" and version " >= 1.0 <= 3.15"
en
Affected