CVE-2025-41733
Published: 18 November 2025
Summary
CVE-2025-41733 is a critical-severity Authentication Bypass by Primary Weakness (CWE-305) vulnerability in Metz-Connect Ewio2-M Firmware. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 30.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and SC-14 (Public Access Protections).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prohibits permitting sensitive actions like setting root credentials via the commissioning wizard without identification or authentication.
Requires validation of inputs to the commissioning wizard, including device initialization state, to block crafted POST requests from succeeding.
Enforces access authorizations on public web interfaces like the commissioning wizard to prevent unauthenticated remote exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability allows unauthenticated remote exploitation of a network-accessible commissioning wizard (public-facing application) via crafted POST requests to bypass authentication and set root credentials, enabling privilege escalation to root-level access.
NVD Description
The commissioning wizard on the affected devices does not validate if the device is already initialized. An unauthenticated remote attacker can construct POST requests to set root credentials.
Deeper analysisAI
CVE-2025-41733 affects the commissioning wizard on vulnerable devices, where it fails to validate if the device is already initialized. This authentication bypass vulnerability, mapped to CWE-305, enables an unauthenticated remote attacker to construct POST requests that set root credentials. Published on 2025-11-18 with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), it poses a critical risk due to its network accessibility and lack of privileges or user interaction required.
An unauthenticated attacker with network access to the device can exploit this by sending crafted POST requests to the commissioning wizard interface. Exploitation grants root-level credentials, allowing full compromise of confidentiality, integrity, and availability on the target device.
Mitigation details are available in the CERT VDE advisory at https://certvde.com/de/advisories/VDE-2025-097.
Details
- CWE(s)