Lantronix EDS3000PS and EDS5000

View CSAF

Summary

Successful exploitation of these vulnerabilities could allow an attacker to bypass authentication and execute code with root-level privileges.

The following versions of Lantronix EDS3000PS and EDS5000 are affected:

  • EDS3000PS 3.1.0.0R2 (CVE-2025-67039, CVE-2025-70082, CVE-2025-67041)
  • EDS5000 2.1.0.0R3 (CVE-2025-67034, CVE-2025-67035, CVE-2025-67036, CVE-2025-67037, CVE-2025-67038)
CVSS Vendor Equipment Vulnerabilities
v3 9.8 Lantronix Lantronix EDS3000PS and EDS5000 Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’), Authentication Bypass Using an Alternate Path or Channel, Unverified Password Change

Background

  • Critical Infrastructure Sectors: Communications, Information Technology, Critical Manufacturing
  • Countries/Areas Deployed: Worldwide
  • Company Headquarters Location: United States

Vulnerabilities

Expand All +

CVE-2025-67034

An issue was discovered in Lantronix EDS5000 2.1.0.0R3. An authenticated attacker can inject OS commands into the “name” parameter when deleting SSL credentials through the management interface. Injected commands are executed with root privileges.

View CVE Details


Affected Products

Lantronix EDS3000PS and EDS5000
Vendor:
Lantronix
Product Version:
Lantronix EDS5000: 2.1.0.0R3
Product Status:
known_affected
Remediations

Vendor fix
For vulnerabilities CVE-2025-67034, CVE-2025-67035, CVE-2025-67036, CVE-2025-67037, CVE-2025-67038 Lantronix recommends users upgrade to EDS5000 version 2.2.0.0R1. The patch can be found here: https://ltrxdev.atlassian.net/wiki/spaces/LTRXTS/pages/2538438657/Latest+Firmware+for+the+EDS5000+series+EDS5008+EDS5016+EDS5032.

Relevant CWE: CWE-78 Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’)


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.2 HIGH CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

CVE-2025-67035

An issue was discovered in Lantronix EDS5000 2.1.0.0R3. The SSH Client and SSH Server pages are affected by multiple OS injection vulnerabilities due to missing sanitization of input parameters. An attacker can inject arbitrary commands in delete actions of various objects, such as server keys, users, and known hosts. Commands are executed with root privileges.

View CVE Details


Affected Products

Lantronix EDS3000PS and EDS5000
Vendor:
Lantronix
Product Version:
Lantronix EDS5000: 2.1.0.0R3
Product Status:
known_affected
Remediations

Vendor fix
For vulnerabilities CVE-2025-67034, CVE-2025-67035, CVE-2025-67036, CVE-2025-67037, CVE-2025-67038 Lantronix recommends users upgrade to EDS5000 version 2.2.0.0R1. The patch can be found here: https://ltrxdev.atlassian.net/wiki/spaces/LTRXTS/pages/2538438657/Latest+Firmware+for+the+EDS5000+series+EDS5008+EDS5016+EDS5032.

Relevant CWE: CWE-78 Imp

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from All CISA Advisories

Read the original article: