Cyber Posture

CVE-2025-53475

High

Published: 11 July 2025

Published
11 July 2025
Modified
23 July 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0184 83.1th percentile
Risk Priority 19 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-53475 is a high-severity SQL Injection (CWE-89) vulnerability in Advantech Iview. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 16.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates SQL injection in NetworkServlet.getNextTrapPage() by enforcing input validation mechanisms to neutralize special elements in parameters.

prevent

Enables identification, reporting, and correction of the specific SQL injection and RCE flaw via patching as detailed in Advantech and CISA advisories.

prevent

Ensures receipt and implementation of security advisories for this CVE from sources like Advantech and CISA to facilitate timely flaw remediation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Why these techniques?

SQL injection in public-facing web app (NetworkServlet) directly enables remote exploitation (T1190); resulting RCE allows arbitrary command execution (T1059).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A vulnerability exists in Advantech iView that could allow for SQL injection and remote code execution through NetworkServlet.getNextTrapPage(). This issue requires an authenticated attacker with at least user-level privileges. Certain parameters in this function are not properly sanitized, allowing an…

more

attacker to perform SQL injection and potentially execute code in the context of the 'nt authority\local service' account.

Deeper analysisAI

CVE-2025-53475 is a vulnerability in Advantech iView that enables SQL injection and remote code execution through the NetworkServlet.getNextTrapPage() function. Certain parameters in this function are not properly sanitized, allowing injection of malicious SQL queries. The issue, published on 2025-07-11, carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and maps to CWE-89 (Improper Neutralization of Special Elements used in an SQL Command).

Exploitation requires an authenticated attacker with at least user-level privileges. Once authenticated, the attacker can leverage the unsanitized parameters to perform SQL injection, potentially achieving remote code execution in the context of the 'NT AUTHORITY\LOCAL SERVICE' account, resulting in high impacts to confidentiality, integrity, and availability.

Mitigation details are provided in advisories from Advantech at https://www.advantech.com/en/support/details/firmware-?id=1-HIPU-183 and CISA ICSA-25-191-08 at https://www.cisa.gov/news-events/ics-advisories/icsa-25-191-08. Security practitioners should review these sources for patch availability, firmware updates, and recommended remediation steps.

Details

CWE(s)

Affected Products

advantech
iview
≤ 5.7.05.7057

CVEs Like This One

CVE-2025-53515Same product: Advantech Iview
CVE-2025-52577Same product: Advantech Iview
CVE-2022-50593Same product: Advantech Iview
CVE-2022-50591Same product: Advantech Iview
CVE-2025-52694Same vendor: Advantech
CVE-2025-53595Shared CWE-89
CVE-2024-55460Shared CWE-89
CVE-2026-39815Shared CWE-89
CVE-2025-36588Shared CWE-89
CVE-2024-56804Shared CWE-89

References