CVE-2025-41772

An unauthenticated remote attacker can obtain valid session tokens because they are exposed in plaintext within the URL parameters of the wwwupdate.cgi endpoint in UBR.
References
Link Resource
https://www.mbs-solutions.de/mbs-2025-0001 Vendor Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:mbs-solutions:universal_bacnet_router_firmware:*:*:*:*:*:*:*:*
OR cpe:2.3:h:mbs-solutions:ubr-01_mk_ii:-:*:*:*:*:*:*:*
cpe:2.3:h:mbs-solutions:ubr-02:-:*:*:*:*:*:*:*
cpe:2.3:h:mbs-solutions:ubr-lon:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-09 09:16

Updated : 2026-03-11 18:23


NVD link : CVE-2025-41772

Mitre link : CVE-2025-41772

CVE.ORG link : CVE-2025-41772


JSON object : View

Products Affected

mbs-solutions

  • ubr-lon
  • universal_bacnet_router_firmware
  • ubr-02
  • ubr-01_mk_ii
CWE
CWE-598

Use of GET Request Method With Sensitive Query Strings