An issue was discovered in Lantronix EDS5000 2.1.0.0R3. The HTTP RPC module executes a shell command to write logs when user's authantication fails. The username is directly concatenated with the command without any sanitization. This allow attackers to inject arbitrary OS commands into the username parameter. Injected commands are executed with root privileges.
References
| Link | Resource |
|---|---|
| http://eds5000.com | Not Applicable |
| http://lantronix.com | Product |
| https://www.cisa.gov/news-events/ics-advisories/icsa-26-069-02 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
History
No history.
Information
Published : 2026-03-11 17:16
Updated : 2026-03-19 20:12
NVD link : CVE-2025-67038
Mitre link : CVE-2025-67038
CVE.ORG link : CVE-2025-67038
JSON object : View
Products Affected
lantronix
- eds5032_firmware
- eds5008_firmware
- eds5032
- eds5016
- eds5008
- eds5016_firmware
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
