CVE-2025-41764
Published: 09 March 2026
Summary
CVE-2025-41764 is a critical-severity Missing Authorization (CWE-862) vulnerability in Mbs-Solutions Universal Bacnet Router Firmware. Its CVSS base score is 9.1 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 14.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-3 (Access Enforcement).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces approved authorizations for access to the wwwupdate.cgi endpoint, directly preventing unauthorized remote attackers from uploading and applying arbitrary updates.
Authorizes and manages access to system components for implementing changes, such as restricting who can upload and apply updates via the vulnerable endpoint.
Prohibits sensitive actions like update uploads without identification and authentication, addressing the insufficient authorization enforcement in wwwupdate.cgi.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability in the public wwwupdate.cgi endpoint allows unauthenticated remote upload/apply of arbitrary updates due to missing authorization, directly enabling T1190.
NVD Description
Due to insufficient authorization enforcement, an unauthorized remote attacker can exploit the wwwupdate.cgi endpoint to upload and apply arbitrary updates.
Deeper analysisAI
CVE-2025-41764 is a critical vulnerability (CVSS score 9.1, CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H) caused by insufficient authorization enforcement (CWE-862) in the wwwupdate.cgi endpoint. Published on 2026-03-09, it enables an unauthorized remote attacker to upload and apply arbitrary updates to the affected component.
Any unauthenticated attacker with network access can exploit the wwwupdate.cgi endpoint with low complexity and no user interaction required. Successful exploitation allows the attacker to upload and apply arbitrary updates, resulting in high integrity and availability impacts.
Mitigation details are available in the vendor advisory at https://www.mbs-solutions.de/mbs-2025-0001.
Details
- CWE(s)