An issue was discovered in Lantronix EDS5000 2.1.0.0R3. The HTTP RPC module executes a shell command to write logs when user's authantication fails. The username is directly concatenated with the command without any sanitization. This allow attackers to inject arbitrary OS commands into the username parameter. Injected commands are executed with root privileges.
Metrics
Affected Vendors & Products
References
History
Wed, 11 Mar 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue was discovered in Lantronix EDS5000 2.1.0.0R3. The HTTP RPC module executes a shell command to write logs when user's authantication fails. The username is directly concatenated with the command without any sanitization. This allow attackers to inject arbitrary OS commands into the username parameter. Injected commands are executed with root privileges. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-03-11T16:12:30.541Z
Reserved: 2025-12-08T00:00:00.000Z
Link: CVE-2025-67038
No data.
Status : Received
Published: 2026-03-11T17:16:52.010
Modified: 2026-03-11T17:16:52.010
Link: CVE-2025-67038
No data.
OpenCVE Enrichment
No data.