CVE-2025-2026
Unknown Unknown - Not Provided
Null Byte Injection in Moxa NPort Web API Causes DoS

Publication date: 2025-12-31

Last updated on: 2025-12-31

Assigner: Moxa Inc.

Description
The NPort 6100-G2/6200-G2 Series is affected by a high-severity vulnerability (CVE-2025-2026) that allows remote attackers to execute a null byte injection through the device’s web API. This may lead to an unexpected device reboot and result in a denial-of-service (DoS) condition. An authenticated remote attacker with web read-only privileges can exploit the vulnerable API to inject malicious input. Successful exploitation may cause the device to reboot, disrupting normal operations and causing a temporary denial of service.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-31
Last Modified
2025-12-31
Generated
2026-05-07
AI Q&A
2025-12-31
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
moxa nport_6200-g2 4.0
moxa nport_6100-g2 4.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-170 The product does not terminate or incorrectly terminates a string or array with a null character or equivalent terminator.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability affects the NPort 6100-G2/6200-G2 Series devices and allows a remote attacker with authenticated web read-only privileges to perform a null byte injection through the device's web API. This injection can cause the device to reboot unexpectedly.


How can this vulnerability impact me? :

Exploitation of this vulnerability can lead to an unexpected reboot of the affected device, causing a denial-of-service (DoS) condition that disrupts normal operations temporarily.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart