Cyber Posture

CVE-2025-52577

High

Published: 11 July 2025

Published
11 July 2025
Modified
23 July 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0087 75.4th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-52577 is a high-severity SQL Injection (CWE-89) vulnerability in Advantech Iview. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 24.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Information input validation directly prevents SQL injection by ensuring unsanitized parameters in NetworkServlet.archiveTrapRange() are checked and rejected.

prevent

Flaw remediation addresses the specific vulnerability through timely application of Advantech firmware updates that fix the input sanitization issue.

prevent

Least privilege limits the impact of remote code execution by restricting the 'nt authority\local service' account privileges even if exploitation succeeds.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

SQL injection in internet-facing web app (NetworkServlet) directly enables remote exploitation for initial access and RCE.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A vulnerability exists in Advantech iView that could allow SQL injection and remote code execution through NetworkServlet.archiveTrapRange(). This issue requires an authenticated attacker with at least user-level privileges. Certain input parameters are not properly sanitized, allowing an attacker to perform…

more

SQL injection and potentially execute code in the context of the 'nt authority\local service' account.

Deeper analysisAI

CVE-2025-52577 is a vulnerability in Advantech iView that enables SQL injection and remote code execution through the NetworkServlet.archiveTrapRange() component. Certain input parameters are not properly sanitized, allowing injection of malicious SQL payloads. The issue affects Advantech iView and was published on 2025-07-11, with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and association to CWE-89.

Exploitation requires an authenticated attacker with at least user-level privileges over the network. A successful attack can achieve SQL injection and remote code execution in the context of the 'nt authority\local service' account, potentially compromising confidentiality, integrity, and availability.

Advantech provides mitigation via firmware updates detailed at https://www.advantech.com/en/support/details/firmware-?id=1-HIPU-183. Additional guidance is available in CISA ICS Advisory ICSA-25-191-08 at https://www.cisa.gov/news-events/ics-advisories/icsa-25-191-08.

Details

CWE(s)

Affected Products

advantech
iview
≤ 5.7.05.7057

CVEs Like This One

CVE-2025-53515Same product: Advantech Iview
CVE-2025-53475Same product: Advantech Iview
CVE-2022-50593Same product: Advantech Iview
CVE-2022-50591Same product: Advantech Iview
CVE-2025-52694Same vendor: Advantech
CVE-2026-3180Shared CWE-89
CVE-2025-1872Shared CWE-89
CVE-2026-32458Shared CWE-89
CVE-2026-24494Shared CWE-89
CVE-2025-26875Shared CWE-89

References