CVE-2025-41760
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to bypass security measures by sending any network traffic through the universal BACnet router, even if an administrator tries to block it with an empty filter list. The issue arises because the router does not enforce restrictions when the filter is empty, meaning no special conditions are needed for an attacker to exploit this flaw.
Technical Description
An administrator may attempt to block all traffic by configuring a pass filter with an empty table. However, in UBR, an empty list does not enforce any restrictions and allows all network traffic to pass unfiltered.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 9, 2026
29 days ago
Last Modified
Mar 11, 2026
27 days ago
Vendor
mbs-solutions
Product
universal bacnet router firmware
Related Vulnerabilities
An attacker can steal valid session tokens from the universal BACnet router firmware because these tokens are visible in the web address used to access the device's update page. This can be done remotely and without needing to log in, making it easy for anyone to exploit if they know the URL.
An attacker can take complete control of the universal BACnet router by exploiting a flaw in its web interface that allows them to bypass security checks when updating the device. This can be done remotely, meaning the attacker doesn't need physical access to the device, making it a serious risk.
This vulnerability allows a low-privileged remote attacker to take complete control of a device by sending a specially crafted HTTP POST request. The attacker only needs network access to the device to exploit this weakness, making it a serious risk for systems using this firmware.
An attacker can exploit a flaw in the universal BACnet router firmware to upload and apply any type of data, such as malicious files or sensitive configuration settings, without proper authorization. This can happen remotely through a specific web endpoint, meaning the attacker doesn’t need physical access to the device.
An attacker can remotely upload and install malicious updates on the universal BACnet router firmware because the system does not properly check if they are authorized to do so. This means that anyone with access to the specific update endpoint can take control of the device without needing any special permissions.