CVE-2025-13605
Authenticated Command Injection in 3onedata GW1101-1D Modbus Gateway
Publication date: 2026-05-04
Last updated on: 2026-05-04
Assigner: CERT.PL
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| 3onedata | modbus_gateway_device | 3.0.59b2024080600r4353 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-78 | The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the 3onedata modbus gateway device model GW1101-1D(RS-485)-TB-P (hardware version V2.2.0). It allows authenticated users to execute arbitrary shell commands with root privileges by inserting a malicious payload into the "IP address" field of the device's diagnosis test tools.
This means that an attacker who has valid authentication can gain full control over the device's operating system by exploiting this input field.
How can this vulnerability impact me? :
The impact of this vulnerability is severe because it allows an authenticated user to execute commands as the root user on the affected device.
- Complete control over the device's operating system.
- Potential to disrupt device functionality or network operations.
- Possibility to use the device as a pivot point for further attacks within the network.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the firmware of the 3onedata modbus gateway device model GW1101-1D(RS-485)-TB-P (hardware version V2.2.0) to version 3.0.59B2024080600R4353 or later.