Cyber Posture

CVE-2025-41733

Critical

Published: 18 November 2025

Published
18 November 2025
Modified
21 November 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0012 30.0th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-41733 is a critical-severity Authentication Bypass by Primary Weakness (CWE-305) vulnerability in Metz-Connect Ewio2-M Firmware. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 30.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and SC-14 (Public Access Protections).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prohibits permitting sensitive actions like setting root credentials via the commissioning wizard without identification or authentication.

prevent

Requires validation of inputs to the commissioning wizard, including device initialization state, to block crafted POST requests from succeeding.

prevent

Enforces access authorizations on public web interfaces like the commissioning wizard to prevent unauthenticated remote exploitation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

The vulnerability allows unauthenticated remote exploitation of a network-accessible commissioning wizard (public-facing application) via crafted POST requests to bypass authentication and set root credentials, enabling privilege escalation to root-level access.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

The commissioning wizard on the affected devices does not validate if the device is already initialized. An unauthenticated remote attacker can construct POST requests to set root credentials.

Deeper analysisAI

CVE-2025-41733 affects the commissioning wizard on vulnerable devices, where it fails to validate if the device is already initialized. This authentication bypass vulnerability, mapped to CWE-305, enables an unauthenticated remote attacker to construct POST requests that set root credentials. Published on 2025-11-18 with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), it poses a critical risk due to its network accessibility and lack of privileges or user interaction required.

An unauthenticated attacker with network access to the device can exploit this by sending crafted POST requests to the commissioning wizard interface. Exploitation grants root-level credentials, allowing full compromise of confidentiality, integrity, and availability on the target device.

Mitigation details are available in the CERT VDE advisory at https://certvde.com/de/advisories/VDE-2025-097.

Details

CWE(s)

Affected Products

metz-connect
ewio2-m firmware
≤ 2.2.0
metz-connect
ewio2-m-bm firmware
≤ 2.2.0
metz-connect
ewio2-bm firmware
≤ 2.2.0

CVEs Like This One

CVE-2025-41736Same product: Metz-Connect Ewio2-Bm
CVE-2025-41735Same product: Metz-Connect Ewio2-Bm
CVE-2025-41734Same product: Metz-Connect Ewio2-Bm
CVE-2026-0869Shared CWE-305
CVE-2026-6266Shared CWE-305
CVE-2025-13915Shared CWE-305
CVE-2026-4670Shared CWE-305
CVE-2025-36386Shared CWE-305
CVE-2025-47776Shared CWE-305
CVE-2026-30849Shared CWE-305

References