An issue was discovered in Lantronix EDS5000 2.1.0.0R3. The HTTP RPC module executes a shell command to write logs when user's authantication fails. The username is directly concatenated with the command without any sanitization. This allow attackers to inject arbitrary OS commands into the username parameter. Injected commands are executed with root privileges.
Metrics
Affected Vendors & Products
References
History
Thu, 12 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-94 | |
| Metrics |
cvssV3_1
|
Thu, 12 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lantronix
Lantronix eds5000 |
|
| Vendors & Products |
Lantronix
Lantronix eds5000 |
Wed, 11 Mar 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue was discovered in Lantronix EDS5000 2.1.0.0R3. The HTTP RPC module executes a shell command to write logs when user's authantication fails. The username is directly concatenated with the command without any sanitization. This allow attackers to inject arbitrary OS commands into the username parameter. Injected commands are executed with root privileges. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2026-03-11T00:00:00.000Z
Updated: 2026-03-12T16:06:41.785Z
Reserved: 2025-12-08T00:00:00.000Z
Link: CVE-2025-67038
Updated: 2026-03-12T16:05:43.751Z
Status : Awaiting Analysis
Published: 2026-03-11T17:16:52.010
Modified: 2026-03-12T21:08:22.643
Link: CVE-2025-67038
No data.
ReportizFlow