CVE-2025-52577

A vulnerability exists in Advantech iView that could allow SQL injection and remote code execution through NetworkServlet.archiveTrapRange(). This issue requires an authenticated attacker with at least user-level privileges. Certain input parameters are not properly sanitized, allowing an attacker to perform SQL injection and potentially execute code in the context of the 'nt authority\local service' account.
Configurations

Configuration 1 (hide)

cpe:2.3:a:advantech:iview:*:*:*:*:*:*:*:*

History

23 Jul 2025, 19:20

Type Values Removed Values Added
CPE cpe:2.3:a:advantech:iview:*:*:*:*:*:*:*:*
First Time Advantech iview
Advantech
References () https://www.advantech.com/en/support/details/firmware-?id=1-HIPU-183 - () https://www.advantech.com/en/support/details/firmware-?id=1-HIPU-183 - Product
References () https://www.cisa.gov/news-events/ics-advisories/icsa-25-191-08 - () https://www.cisa.gov/news-events/ics-advisories/icsa-25-191-08 - Third Party Advisory, US Government Resource

15 Jul 2025, 13:14

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-11 00:15

Updated : 2025-07-23 19:20


NVD link : CVE-2025-52577

Mitre link : CVE-2025-52577

CVE.ORG link : CVE-2025-52577


JSON object : View

Products Affected

advantech

  • iview
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')