CVE-2025-6893

CRITICAL

Moxa - Privilege Escalation

Title source: llm
STIX 2.1

Description

An Execution with Unnecessary Privileges vulnerability has been identified in Moxa’s network security appliances and routers. A flaw in broken access control has been identified in the /api/v1/setting/data endpoint of the affected device. This flaw allows a low-privileged authenticated user to call the API without the required permissions, thereby gaining the ability to access or modify system configuration data. Successful exploitation may lead to privilege escalation, allowing the attacker to access or modify sensitive system settings. While the overall impact is high, there is no loss of confidentiality or integrity within any subsequent systems.

Scores

CVSS v4 9.3
EPSS 0.0008
EPSS Percentile 24.1%
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-250
Status published
Products (14)
Moxa/EDF-G1002-BP Series 1.0 - 3.17
Moxa/EDF-G1002-BP Series 3.21
Moxa/EDR-8010 Series 1.0 - 3.17
Moxa/EDR-8010 Series 3.21
Moxa/EDR-G9010 Series 1.0 - 3.14
Moxa/EDR-G9010 Series 3.21
Moxa/NAT-102 Series 1.0 - 3.17
Moxa/NAT-102 Series 3.21
Moxa/NAT-108 Series 1.0 - 3.16
Moxa/NAT-108 Series 3.21
... and 4 more
Published Oct 17, 2025
Tracked Since Feb 18, 2026