CVE-2025-41761

A low‑privileged local attacker who gains access to the UBR service account (e.g., via SSH) can escalate privileges to obtain full system access. This is due to the service account being permitted to execute certain binaries (e.g., tcpdump and ip) with sudo.
References
Link Resource
https://www.mbs-solutions.de/mbs-2025-0001 Vendor Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:mbs-solutions:universal_bacnet_router_firmware:*:*:*:*:*:*:*:*
OR cpe:2.3:h:mbs-solutions:ubr-01_mk_ii:-:*:*:*:*:*:*:*
cpe:2.3:h:mbs-solutions:ubr-02:-:*:*:*:*:*:*:*
cpe:2.3:h:mbs-solutions:ubr-lon:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-09 09:16

Updated : 2026-03-11 18:27


NVD link : CVE-2025-41761

Mitre link : CVE-2025-41761

CVE.ORG link : CVE-2025-41761


JSON object : View

Products Affected

mbs-solutions

  • ubr-lon
  • universal_bacnet_router_firmware
  • ubr-02
  • ubr-01_mk_ii
CWE
CWE-88

Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')