An issue was discovered in Lantronix EDS3000PS 3.1.0.0R2. The authentication on management pages can be bypassed by appending a specific suffix to the URL and by sending an Authorization header that uses "admin" as the username.
History

Thu, 12 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-288
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Lantronix
Lantronix eds3000ps
Vendors & Products Lantronix
Lantronix eds3000ps

Wed, 11 Mar 2026 16:30:00 +0000

Type Values Removed Values Added
Description An issue was discovered in Lantronix EDS3000PS 3.1.0.0R2. The authentication on management pages can be bypassed by appending a specific suffix to the URL and by sending an Authorization header that uses "admin" as the username.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2026-03-11T00:00:00.000Z

Updated: 2026-03-12T16:09:15.255Z

Reserved: 2025-12-08T00:00:00.000Z

Link: CVE-2025-67039

cve-icon Vulnrichment

Updated: 2026-03-12T16:08:01.529Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-11T17:16:52.117

Modified: 2026-03-12T21:08:22.643

Link: CVE-2025-67039

cve-icon Redhat

No data.