CVE-2025-67038

An issue was discovered in Lantronix EDS5000 2.1.0.0R3. The HTTP RPC module executes a shell command to write logs when user's authantication fails. The username is directly concatenated with the command without any sanitization. This allow attackers to inject arbitrary OS commands into the username parameter. Injected commands are executed with root privileges.
References
Link Resource
http://eds5000.com Not Applicable
http://lantronix.com Product
https://www.cisa.gov/news-events/ics-advisories/icsa-26-069-02 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:lantronix:eds5032_firmware:2.1.0.0:r3:*:*:*:*:*:*
cpe:2.3:h:lantronix:eds5032:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:lantronix:eds5008_firmware:2.1.0.0:r3:*:*:*:*:*:*
cpe:2.3:h:lantronix:eds5008:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:lantronix:eds5016_firmware:2.1.0.0:r3:*:*:*:*:*:*
cpe:2.3:h:lantronix:eds5016:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-11 17:16

Updated : 2026-03-19 20:12


NVD link : CVE-2025-67038

Mitre link : CVE-2025-67038

CVE.ORG link : CVE-2025-67038


JSON object : View

Products Affected

lantronix

  • eds5032_firmware
  • eds5008_firmware
  • eds5032
  • eds5016
  • eds5008
  • eds5016_firmware
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')