CVE-2025-13605
Awaiting Analysis Awaiting Analysis - Queue
Authenticated Command Injection in 3onedata GW1101-1D Modbus Gateway

Publication date: 2026-05-04

Last updated on: 2026-05-04

Assigner: CERT.PL

Description
3onedata modbus gateway device model GW1101-1D(RS-485)-TB-P (hardware version V2.2.0) allows authenticated users to execute arbitrary shell commands in the context of the root user by providing payload in the "IP address" field of the diagnosis test tools. This issue has been resolved in firmware version 3.0.59B2024080600R4353
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-04
Last Modified
2026-05-04
Generated
2026-05-07
AI Q&A
2026-05-05
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
3onedata modbus_gateway_device 3.0.59b2024080600r4353
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the 3onedata modbus gateway device model GW1101-1D(RS-485)-TB-P (hardware version V2.2.0). It allows authenticated users to execute arbitrary shell commands with root privileges by inserting a malicious payload into the "IP address" field of the device's diagnosis test tools.

This means that an attacker who has valid authentication can gain full control over the device's operating system by exploiting this input field.


How can this vulnerability impact me? :

The impact of this vulnerability is severe because it allows an authenticated user to execute commands as the root user on the affected device.

  • Complete control over the device's operating system.
  • Potential to disrupt device functionality or network operations.
  • Possibility to use the device as a pivot point for further attacks within the network.

What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, update the firmware of the 3onedata modbus gateway device model GW1101-1D(RS-485)-TB-P (hardware version V2.2.0) to version 3.0.59B2024080600R4353 or later.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart