An issue was discovered in Lantronix EDS5000 2.1.0.0R3. An authenticated attacker can inject OS commands into the "name" parameter when deleting SSL credentials through the management interface. Injected commands are executed with root privileges.
References
| Link | Resource |
|---|---|
| http://eds5000.com | Not Applicable |
| http://lantronix.com | Product |
| https://www.cisa.gov/news-events/ics-advisories/icsa-26-069-02 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
History
19 Mar 2026, 20:23
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:h:lantronix:eds5016:-:*:*:*:*:*:*:* cpe:2.3:o:lantronix:eds5032_firmware:2.1.0.0:r3:*:*:*:*:*:* cpe:2.3:o:lantronix:eds5016_firmware:2.1.0.0:r3:*:*:*:*:*:* cpe:2.3:h:lantronix:eds5008:-:*:*:*:*:*:*:* cpe:2.3:o:lantronix:eds5008_firmware:2.1.0.0:r3:*:*:*:*:*:* cpe:2.3:h:lantronix:eds5032:-:*:*:*:*:*:*:* |
|
| References | () http://eds5000.com - Not Applicable | |
| References | () http://lantronix.com - Product | |
| References | () https://www.cisa.gov/news-events/ics-advisories/icsa-26-069-02 - Third Party Advisory, US Government Resource | |
| First Time |
Lantronix eds5016 Firmware
Lantronix eds5008 Firmware Lantronix eds5032 Firmware Lantronix eds5016 Lantronix eds5008 Lantronix eds5032 Lantronix |
|
| Summary |
|
12 Mar 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-94 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
11 Mar 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-11 17:16
Updated : 2026-03-19 20:23
NVD link : CVE-2025-67034
Mitre link : CVE-2025-67034
CVE.ORG link : CVE-2025-67034
JSON object : View
Products Affected
lantronix
- eds5016_firmware
- eds5016
- eds5032
- eds5008
- eds5032_firmware
- eds5008_firmware
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
