An issue was discovered in Lantronix EDS5000 2.1.0.0R3. The SSH Client and SSH Server pages are affected by multiple OS injection vulnerabilities due to missing sanitization of input parameters. An attacker can inject arbitrary commands in delete actions of various objects, such as server keys, users, and known hosts. Commands are executed with root privileges.
References
| Link | Resource |
|---|---|
| http://eds5000.com | Not Applicable |
| http://lantronix.com | Product |
| https://www.cisa.gov/news-events/ics-advisories/icsa-26-069-02 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
History
No history.
Information
Published : 2026-03-11 17:16
Updated : 2026-03-19 20:17
NVD link : CVE-2025-67035
Mitre link : CVE-2025-67035
CVE.ORG link : CVE-2025-67035
JSON object : View
Products Affected
lantronix
- eds5032_firmware
- eds5008_firmware
- eds5032
- eds5016
- eds5008
- eds5016_firmware
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
