CVE-2025-41766
Unknown (Web-Enabled Controller) · wwwubr Service
A stack-based buffer overflow in the ubr-network method of the wwwubr service allows low-privileged remote attackers to achieve full device compromise via a crafted POST request.
Executive summary
Low-privileged remote attackers can gain total control over the affected device by triggering a stack-based buffer overflow in the wwwubr service.
Vulnerability
A stack-based buffer overflow exists in the ubr-network method of the wwwubr component. A remote attacker with low-level credentials can trigger this flaw by sending a specially crafted HTTP POST request, leading to arbitrary code execution.
Business impact
This vulnerability allows an attacker to escalate from a low-privileged account to full system authority. With a CVSS score of 8.8, the impact includes total loss of confidentiality, integrity, and availability of the controller. In an industrial or building management context, this could result in the physical disruption of controlled systems.
Remediation
Immediate Action: Apply the latest firmware or software updates from the vendor to resolve the memory management issues in the wwwubr service.
Proactive Monitoring: Monitor network traffic for malformed or excessively large POST requests targeting the ubr-network method and review device logs for signs of memory faults.
Compensating Controls: Disable unnecessary services and methods within the web interface and use an Intrusion Prevention System (IPS) to detect and block buffer overflow patterns.
Exploitation status
Public Exploit Available: false
Analyst recommendation
The risk of full device compromise from a low-privileged starting point is a critical concern. Organizations must prioritize patching affected controllers and should consider re-evaluating the necessity of exposing the management interface to even authenticated users.