A low‑privileged local attacker who gains access to the UBR service account (e.g., via SSH) can escalate privileges to obtain full system access. This is due to the service account being permitted to execute certain binaries (e.g., tcpdump and ip) with sudo.
References
| Link | Resource |
|---|---|
| https://www.mbs-solutions.de/mbs-2025-0001 | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-03-09 09:16
Updated : 2026-03-11 18:27
NVD link : CVE-2025-41761
Mitre link : CVE-2025-41761
CVE.ORG link : CVE-2025-41761
JSON object : View
Products Affected
mbs-solutions
- ubr-lon
- universal_bacnet_router_firmware
- ubr-02
- ubr-01_mk_ii
CWE
CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
