CVE-2025-52577
Published: 11 July 2025
Summary
CVE-2025-52577 is a high-severity SQL Injection (CWE-89) vulnerability in Advantech Iview. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 24.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Information input validation directly prevents SQL injection by ensuring unsanitized parameters in NetworkServlet.archiveTrapRange() are checked and rejected.
Flaw remediation addresses the specific vulnerability through timely application of Advantech firmware updates that fix the input sanitization issue.
Least privilege limits the impact of remote code execution by restricting the 'nt authority\local service' account privileges even if exploitation succeeds.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in internet-facing web app (NetworkServlet) directly enables remote exploitation for initial access and RCE.
NVD Description
A vulnerability exists in Advantech iView that could allow SQL injection and remote code execution through NetworkServlet.archiveTrapRange(). This issue requires an authenticated attacker with at least user-level privileges. Certain input parameters are not properly sanitized, allowing an attacker to perform…
more
SQL injection and potentially execute code in the context of the 'nt authority\local service' account.
Deeper analysisAI
CVE-2025-52577 is a vulnerability in Advantech iView that enables SQL injection and remote code execution through the NetworkServlet.archiveTrapRange() component. Certain input parameters are not properly sanitized, allowing injection of malicious SQL payloads. The issue affects Advantech iView and was published on 2025-07-11, with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and association to CWE-89.
Exploitation requires an authenticated attacker with at least user-level privileges over the network. A successful attack can achieve SQL injection and remote code execution in the context of the 'nt authority\local service' account, potentially compromising confidentiality, integrity, and availability.
Advantech provides mitigation via firmware updates detailed at https://www.advantech.com/en/support/details/firmware-?id=1-HIPU-183. Additional guidance is available in CISA ICS Advisory ICSA-25-191-08 at https://www.cisa.gov/news-events/ics-advisories/icsa-25-191-08.
Details
- CWE(s)