CVE-2025-2026

Published: Dic 31, 2025 Last Modified: Dic 31, 2025
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 7,1
Attack Vector: network
Attack Complexity: low
Privileges Required: low
User Interaction: none
Confidentiality: N/A
Integrity: N/A
Availability: N/A

Description

AI Translation Available

The NPort 6100-G2/6200-G2 Series is affected by a high-severity vulnerability (CVE-2025-2026) that allows remote attackers to execute a null byte injection through the device’s web API. This may lead to an unexpected device reboot and result in a denial-of-service (DoS) condition.

An authenticated remote attacker with web read-only privileges can exploit the vulnerable API to inject malicious input. Successful exploitation may cause the device to reboot, disrupting normal operations and causing a temporary denial of service.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0015
Percentile
0,4th
Updated

EPSS Score Trend (Last 75 Days)

170

Improper Null Termination

Incomplete
Common Consequences
Security Scopes Affected:
Confidentiality Integrity Availability Access Control Other
Potential Impacts:
Read Memory Execute Unauthorized Code Or Commands Dos: Crash, Exit, Or Restart Dos: Resource Consumption (Cpu) Dos: Resource Consumption (Memory) Modify Memory Alter Execution Logic
Applicable Platforms
Languages: C, C++
View CWE Details
https://www.moxa.com/en/support/product-support/security-advisory/mpsa-251731-c…