A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.17.1), RUGGEDCOM ROX MX5000RE (All versions < V2.17.1), RUGGEDCOM ROX RX1400 (All versions < V2.17.1), RUGGEDCOM ROX RX1500 (All versions < V2.17.1), RUGGEDCOM ROX RX1501 (All versions < V2.17.1), RUGGEDCOM ROX RX1510 (All versions < V2.17.1), RUGGEDCOM ROX RX1511 (All versions < V2.17.1), RUGGEDCOM ROX RX1512 (All versions < V2.17.1), RUGGEDCOM ROX RX1524 (All versions < V2.17.1), RUGGEDCOM ROX RX1536 (All versions < V2.17.1), RUGGEDCOM ROX RX5000 (All versions < V2.17.1). Affected devices do not properly sanitize user-supplied input in the Scheduler functionality of the Web UI, allowing commands to be injected into the task scheduling backend.
This could allow an authenticated remote attacker to execute arbitrary commands with root privileges on the underlying operating system.
Metrics
Affected Vendors & Products
References
History
Tue, 12 May 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Authenticated Remote Command Injection via Scheduler in RUGGEDCOM Web UI |
Tue, 12 May 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Siemens
Siemens ruggedcom Rox Mx5000 Siemens ruggedcom Rox Mx5000re Siemens ruggedcom Rox Rx1400 Siemens ruggedcom Rox Rx1500 Siemens ruggedcom Rox Rx1501 Siemens ruggedcom Rox Rx1510 Siemens ruggedcom Rox Rx1511 Siemens ruggedcom Rox Rx1512 Siemens ruggedcom Rox Rx1524 Siemens ruggedcom Rox Rx1536 Siemens ruggedcom Rox Rx5000 |
|
| Vendors & Products |
Siemens
Siemens ruggedcom Rox Mx5000 Siemens ruggedcom Rox Mx5000re Siemens ruggedcom Rox Rx1400 Siemens ruggedcom Rox Rx1500 Siemens ruggedcom Rox Rx1501 Siemens ruggedcom Rox Rx1510 Siemens ruggedcom Rox Rx1511 Siemens ruggedcom Rox Rx1512 Siemens ruggedcom Rox Rx1524 Siemens ruggedcom Rox Rx1536 Siemens ruggedcom Rox Rx5000 |
Tue, 12 May 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.17.1), RUGGEDCOM ROX MX5000RE (All versions < V2.17.1), RUGGEDCOM ROX RX1400 (All versions < V2.17.1), RUGGEDCOM ROX RX1500 (All versions < V2.17.1), RUGGEDCOM ROX RX1501 (All versions < V2.17.1), RUGGEDCOM ROX RX1510 (All versions < V2.17.1), RUGGEDCOM ROX RX1511 (All versions < V2.17.1), RUGGEDCOM ROX RX1512 (All versions < V2.17.1), RUGGEDCOM ROX RX1524 (All versions < V2.17.1), RUGGEDCOM ROX RX1536 (All versions < V2.17.1), RUGGEDCOM ROX RX5000 (All versions < V2.17.1). Affected devices do not properly sanitize user-supplied input in the Scheduler functionality of the Web UI, allowing commands to be injected into the task scheduling backend. This could allow an authenticated remote attacker to execute arbitrary commands with root privileges on the underlying operating system. | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: siemens
Published:
Updated: 2026-05-12T08:20:53.983Z
Reserved: 2025-04-16T09:06:15.880Z
Link: CVE-2025-40949
No data.
Status : Received
Published: 2026-05-12T10:16:43.360
Modified: 2026-05-12T10:16:43.360
Link: CVE-2025-40949
No data.
OpenCVE Enrichment
Updated: 2026-05-12T11:00:07Z