A non-primary administrator user with admin rights to the web interface but without shell access permissions can display configuration of the device including the master admin password. This vulnerability also allows the user to give themselves shell access with the root gid.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://www.tenable.com/security/research/tra-2025-25 |
|
History
Fri, 05 Sep 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 27 Aug 2025 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Racom
Racom m!dge |
|
| Vendors & Products |
Racom
Racom m!dge |
Tue, 26 Aug 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A non-primary administrator user with admin rights to the web interface but without shell access permissions can display configuration of the device including the master admin password. This vulnerability also allows the user to give themselves shell access with the root gid. | |
| Title | RACOM M!DGE2 Privilege Escalation via SDK Testing Endpoint | |
| Weaknesses | CWE-269 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: tenable
Published: 2025-08-26T16:26:08.624Z
Updated: 2025-09-05T17:06:09.016Z
Reserved: 2025-04-15T21:53:52.386Z
Link: CVE-2025-36729
Updated: 2025-08-26T17:31:28.507Z
Status : Awaiting Analysis
Published: 2025-08-26T17:15:37.580
Modified: 2025-08-29T16:22:31.970
Link: CVE-2025-36729
No data.
ReportizFlow