An Execution with Unnecessary Privileges vulnerability has been identified in Moxa’s network security appliances and routers. A flaw in the API authorization logic of the affected device allows an authenticated, low-privileged user to execute the administrative `ping` function, which is restricted to higher-privileged roles. This vulnerability enables the user to perform internal network reconnaissance, potentially discovering internal hosts or services that would otherwise be inaccessible. Repeated exploitation could lead to minor resource consumption. While the overall impact is limited, it may result in some loss of confidentiality and availability on the affected device. There is no impact on the integrity of the device, and the vulnerability does not affect any subsequent systems.
History

Mon, 20 Oct 2025 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Moxa
Moxa edf-g1002-bp
Moxa edr-8010
Moxa edr-g9010
Moxa nat-102
Moxa nat-108
Moxa oncell G4302-lte4
Moxa tn-4900
Vendors & Products Moxa
Moxa edf-g1002-bp
Moxa edr-8010
Moxa edr-g9010
Moxa nat-102
Moxa nat-108
Moxa oncell G4302-lte4
Moxa tn-4900

Fri, 17 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 17 Oct 2025 02:45:00 +0000

Type Values Removed Values Added
Description An Execution with Unnecessary Privileges vulnerability has been identified in Moxa’s network security appliances and routers. A flaw in the API authorization logic of the affected device allows an authenticated, low-privileged user to execute the administrative `ping` function, which is restricted to higher-privileged roles. This vulnerability enables the user to perform internal network reconnaissance, potentially discovering internal hosts or services that would otherwise be inaccessible. Repeated exploitation could lead to minor resource consumption. While the overall impact is limited, it may result in some loss of confidentiality and availability on the affected device. There is no impact on the integrity of the device, and the vulnerability does not affect any subsequent systems.
Weaknesses CWE-250
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Moxa

Published: 2025-10-17T02:25:15.293Z

Updated: 2025-10-17T13:43:17.614Z

Reserved: 2025-06-28T15:51:38.895Z

Link: CVE-2025-6894

cve-icon Vulnrichment

Updated: 2025-10-17T13:43:05.079Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-17T03:15:36.540

Modified: 2025-10-21T19:31:50.020

Link: CVE-2025-6894

cve-icon Redhat

No data.