An issue was discovered in Lantronix EDS5000 2.1.0.0R3. The HTTP RPC module executes a shell command to write logs when user's authantication fails. The username is directly concatenated with the command without any sanitization. This allow attackers to inject arbitrary OS commands into the username parameter. Injected commands are executed with root privileges.
References
| Link | Resource |
|---|---|
| http://eds5000.com | Not Applicable |
| http://lantronix.com | Product |
| https://www.cisa.gov/news-events/ics-advisories/icsa-26-069-02 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
History
19 Mar 2026, 20:12
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Lantronix eds5016 Firmware
Lantronix eds5008 Firmware Lantronix eds5032 Firmware Lantronix eds5016 Lantronix eds5008 Lantronix eds5032 Lantronix |
|
| CPE | cpe:2.3:h:lantronix:eds5016:-:*:*:*:*:*:*:* cpe:2.3:o:lantronix:eds5032_firmware:2.1.0.0:r3:*:*:*:*:*:* cpe:2.3:o:lantronix:eds5016_firmware:2.1.0.0:r3:*:*:*:*:*:* cpe:2.3:h:lantronix:eds5008:-:*:*:*:*:*:*:* cpe:2.3:o:lantronix:eds5008_firmware:2.1.0.0:r3:*:*:*:*:*:* cpe:2.3:h:lantronix:eds5032:-:*:*:*:*:*:*:* |
|
| References | () http://eds5000.com - Not Applicable | |
| References | () http://lantronix.com - Product | |
| References | () https://www.cisa.gov/news-events/ics-advisories/icsa-26-069-02 - Third Party Advisory, VDB Entry | |
| Summary |
|
12 Mar 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| CWE | CWE-94 |
11 Mar 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-11 17:16
Updated : 2026-03-19 20:12
NVD link : CVE-2025-67038
Mitre link : CVE-2025-67038
CVE.ORG link : CVE-2025-67038
JSON object : View
Products Affected
lantronix
- eds5016_firmware
- eds5016
- eds5032
- eds5008
- eds5032_firmware
- eds5008_firmware
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
