A vulnerability exists in Advantech iView that could allow SQL injection
and remote code execution through NetworkServlet.archiveTrapRange().
This issue requires an authenticated attacker with at least user-level
privileges. Certain input parameters are not properly sanitized,
allowing an attacker to perform SQL injection and potentially execute
code in the context of the 'nt authority\local service' account.
References
| Link | Resource |
|---|---|
| https://www.advantech.com/en/support/details/firmware-?id=1-HIPU-183 | Product |
| https://www.cisa.gov/news-events/ics-advisories/icsa-25-191-08 | Third Party Advisory US Government Resource |
Configurations
History
23 Jul 2025, 19:20
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.advantech.com/en/support/details/firmware-?id=1-HIPU-183 - Product | |
| References | () https://www.cisa.gov/news-events/ics-advisories/icsa-25-191-08 - Third Party Advisory, US Government Resource | |
| CPE | cpe:2.3:a:advantech:iview:*:*:*:*:*:*:*:* | |
| First Time |
Advantech iview
Advantech |
15 Jul 2025, 13:14
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-07-11 00:15
Updated : 2025-07-23 19:20
NVD link : CVE-2025-52577
Mitre link : CVE-2025-52577
CVE.ORG link : CVE-2025-52577
JSON object : View
Products Affected
advantech
- iview
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
