Cyber Posture

CVE-2025-53515

High

Published: 11 July 2025

Published
11 July 2025
Modified
01 August 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0087 75.4th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-53515 is a high-severity SQL Injection (CWE-89) vulnerability in Advantech Iview. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 24.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the unsanitized input parameters in NetworkServlet.archiveTrap() by enforcing validation to block SQL injection payloads.

prevent

Addresses the root flaw by requiring timely installation of Advantech firmware updates that patch the SQL injection and RCE vulnerability.

detect

Identifies SQL injection vulnerabilities like this in Advantech iView through vulnerability scanning, enabling proactive remediation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

SQL injection in public-facing web servlet (NetworkServlet) directly enables remote exploitation of a web application, matching T1190; leads to RCE but no other techniques are directly facilitated by the vuln itself.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A vulnerability exists in Advantech iView that allows for SQL injection and remote code execution through NetworkServlet.archiveTrap(). This issue requires an authenticated attacker with at least user-level privileges. Certain input parameters are not sanitized, allowing an attacker to perform SQL…

more

injection and potentially execute code in the context of the 'nt authority\local service' account.

Deeper analysisAI

CVE-2025-53515 is a SQL injection vulnerability in Advantech iView that enables remote code execution through the NetworkServlet.archiveTrap() component. Certain input parameters are not properly sanitized, allowing injection of malicious SQL queries as described under CWE-89. The flaw affects Advantech iView systems and carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to network accessibility, low attack complexity, and significant impacts on confidentiality, integrity, and availability.

An authenticated attacker with at least user-level privileges can exploit this vulnerability remotely by submitting crafted inputs to the affected servlet. Successful exploitation allows SQL injection and subsequent remote code execution in the context of the 'nt authority\local service' account, potentially enabling full system compromise on the targeted iView instance.

Advantech provides firmware updates addressing this issue via their support page at https://www.advantech.com/en/support/details/firmware-?id=1-HIPU-183. Additional mitigation details and recommendations are outlined in CISA ICS Advisory ICSA-25-191-08 at https://www.cisa.gov/news-events/ics-advisories/icsa-25-191-08.

Details

CWE(s)

Affected Products

advantech
iview
≤ 5.7.05.7057

CVEs Like This One

CVE-2025-52577Same product: Advantech Iview
CVE-2025-53475Same product: Advantech Iview
CVE-2022-50593Same product: Advantech Iview
CVE-2022-50591Same product: Advantech Iview
CVE-2025-52694Same vendor: Advantech
CVE-2026-3180Shared CWE-89
CVE-2025-1872Shared CWE-89
CVE-2026-32458Shared CWE-89
CVE-2026-24494Shared CWE-89
CVE-2025-26875Shared CWE-89

References