Cyber Posture

CVE-2025-67038

CriticalRCE

Published: 11 March 2026

Published
11 March 2026
Modified
19 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0008 22.5th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-67038 is a critical-severity Code Injection (CWE-94) vulnerability in Lantronix Eds5032 Firmware. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 22.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires validation of username inputs before concatenation into shell commands, directly preventing command injection in the HTTP RPC authentication logging module.

prevent

Mandates timely flaw remediation by applying vendor patches for the specific command injection vulnerability in Lantronix EDS5000 version 2.1.0.0R3.

prevent

Enforces least privilege to prevent injected commands in authentication logging from executing with root privileges, limiting potential damage from exploitation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Direct unauthenticated command injection into shell via public HTTP interface enables T1190 for initial exploitation and T1059.004 for Unix shell command execution as root.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

An issue was discovered in Lantronix EDS5000 2.1.0.0R3. The HTTP RPC module executes a shell command to write logs when user's authantication fails. The username is directly concatenated with the command without any sanitization. This allow attackers to inject arbitrary…

more

OS commands into the username parameter. Injected commands are executed with root privileges.

Deeper analysisAI

CVE-2025-67038 is a critical command injection vulnerability (CWE-94) in the Lantronix EDS5000 device, specifically version 2.1.0.0R3. The issue resides in the HTTP RPC module, which executes a shell command to log failed user authentication attempts. The username parameter is directly concatenated into this command without sanitization, enabling attackers to inject arbitrary OS commands that execute with root privileges. The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and was published on 2026-03-11.

Unauthenticated attackers with network access to the affected device can exploit this vulnerability by supplying a malicious username during an authentication attempt, such as via a login form. No user interaction or privileges are required, and exploitation is straightforward due to low complexity. Successful injection results in arbitrary command execution as root, allowing full device compromise, including unauthorized access to data, configuration changes, service disruption, or persistence mechanisms.

Mitigation details are provided in advisories from the vendor at http://eds5000.com and http://lantronix.com, as well as CISA ICS Advisory ICSA-26-069-02 at https://www.cisa.gov/news-events/ics-advisories/icsa-26-069-02. Security practitioners should review these resources for patching instructions, version updates, or interim workarounds.

Details

CWE(s)

Affected Products

lantronix
eds5032 firmware
2.1.0.0
lantronix
eds5008 firmware
2.1.0.0
lantronix
eds5016 firmware
2.1.0.0

CVEs Like This One

CVE-2025-67035Same product: Lantronix Eds5008
CVE-2025-67037Same product: Lantronix Eds5008
CVE-2025-67036Same product: Lantronix Eds5008
CVE-2025-67034Same product: Lantronix Eds5008
CVE-2025-67041Same vendor: Lantronix
CVE-2026-25001Shared CWE-94
CVE-2024-39148Shared CWE-94
CVE-2026-3120Shared CWE-94
CVE-2025-22905Shared CWE-94
CVE-2025-70082Same vendor: Lantronix

References