CVE-2025-41767
Published: 09 March 2026
Summary
CVE-2025-41767 is a high-severity Improper Verification of Cryptographic Signature (CWE-347) vulnerability in Mbs-Solutions Universal Bacnet Router Firmware. Its CVSS base score is 7.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 10.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Requires verification of digital signatures using organization-approved certificates before installation, directly preventing improper verification of cryptographic signatures.
Component authenticity commonly depends on cryptographic signatures; the control enforces proper verification of those signatures.
PKI certificates under an approved policy require cryptographic signature verification on issuance and validation.
Requires cryptographic signatures on authoritative data and support for verifying the chain of trust.
Mandates verification of cryptographic signatures (e.g., DNSSEC RRSIG) on resolution responses, addressing missing or bypassed signature checks.
Integrity tools commonly rely on cryptographic signatures whose improper validation this weakness covers.
Authenticity validation commonly relies on cryptographic signature or certificate checks that this control enforces.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct exploitation of the public web interface (wwwupdate.cgi) via signature verification bypass enables remote full device compromise.
NVD Description
A high-privileged remote attacker can fully compromise the device by abusing an update signature bypass vulnerability in the wwwupdate.cgi method in the web interface of UBR.
Deeper analysisAI
CVE-2025-41767 is an update signature bypass vulnerability in the wwwupdate.cgi method of the web interface in UBR. Published on 2026-03-09, it corresponds to CWE-347 (Improper Verification of Cryptographic Signature) and carries a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact.
A high-privileged remote attacker can exploit this vulnerability over the network with low attack complexity and no user interaction. Exploitation enables full device compromise, granting high-level impacts on confidentiality, integrity, and availability.
The primary advisory reference is available at https://www.mbs-solutions.de/mbs-2025-0001, which provides further details on the issue.
Details
- CWE(s)