CVE-2025-2026
Unknown
Unknown - Not Provided
Null Byte Injection in Moxa NPort Web API Causes DoS
Publication date: 2025-12-31
Last updated on: 2025-12-31
Assigner: Moxa Inc.
Description
Description
The NPort 6100-G2/6200-G2 Series is affected by a high-severity vulnerability (CVE-2025-2026) that allows remote attackers to execute a null byte injection through the device’s web API. This may lead to an unexpected device reboot and result in a denial-of-service (DoS) condition.
An authenticated remote attacker with web read-only privileges can exploit the vulnerable API to inject malicious input. Successful exploitation may cause the device to reboot, disrupting normal operations and causing a temporary denial of service.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| moxa | nport_6200-g2 | 4.0 |
| moxa | nport_6100-g2 | 4.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-170 | The product does not terminate or incorrectly terminates a string or array with a null character or equivalent terminator. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability affects the NPort 6100-G2/6200-G2 Series devices and allows a remote attacker with authenticated web read-only privileges to perform a null byte injection through the device's web API. This injection can cause the device to reboot unexpectedly.
How can this vulnerability impact me? :
Exploitation of this vulnerability can lead to an unexpected reboot of the affected device, causing a denial-of-service (DoS) condition that disrupts normal operations temporarily.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70