A vulnerability exists in Advantech iView that could allow SQL injection
and remote code execution through NetworkServlet.archiveTrapRange().
This issue requires an authenticated attacker with at least user-level
privileges. Certain input parameters are not properly sanitized,
allowing an attacker to perform SQL injection and potentially execute
code in the context of the 'nt authority\local service' account.
References
Link | Resource |
---|---|
https://www.advantech.com/en/support/details/firmware-?id=1-HIPU-183 | Product |
https://www.cisa.gov/news-events/ics-advisories/icsa-25-191-08 | Third Party Advisory US Government Resource |
Configurations
History
23 Jul 2025, 19:20
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:advantech:iview:*:*:*:*:*:*:*:* | |
First Time |
Advantech iview
Advantech |
|
References | () https://www.advantech.com/en/support/details/firmware-?id=1-HIPU-183 - Product | |
References | () https://www.cisa.gov/news-events/ics-advisories/icsa-25-191-08 - Third Party Advisory, US Government Resource |
15 Jul 2025, 13:14
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-11 00:15
Updated : 2025-07-23 19:20
NVD link : CVE-2025-52577
Mitre link : CVE-2025-52577
CVE.ORG link : CVE-2025-52577
JSON object : View
Products Affected
advantech
- iview
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')