CVE-2026-25823

HMS Networks · Ewon Flexy and Cosy+

A stack buffer overflow in HMS Networks Ewon Flexy and Cosy+ devices allows unauthenticated remote code execution or denial of service via malicious network requests.

Executive summary

Critical stack buffer overflow vulnerabilities in HMS Networks industrial gateways allow unauthenticated attackers to remotely execute code or crash devices, threatening industrial control stability.

Vulnerability

This vulnerability is a classic stack-based buffer overflow occurring within the device firmware. An unauthenticated remote attacker can send specially crafted packets to the device that overwrite memory, leading to either a system crash or the execution of arbitrary commands with high privileges.

Business impact

The impact on industrial operations is severe, as these gateways often manage critical connectivity between OT and IT networks. A CVSS score of 9.8 reflects the potential for unauthenticated remote code execution, which could allow an attacker to pivot into the internal industrial network. This could lead to production downtime, physical equipment damage, or theft of operational data.

Remediation

Immediate Action: Apply firmware updates provided by HMS Networks (15.0s4 for Flexy, 22.1s6 or 23.0s3 for Cosy+) to patch the overflow vulnerability.

Proactive Monitoring: Monitor industrial network traffic for anomalous packets directed at gateway management ports and track device stability for unexpected reboots.

Compensating Controls: Restrict access to the device management interfaces using firewalls and ensure the devices are not exposed directly to the public internet.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the critical role these devices play in industrial environments, immediate firmware patching is mandatory. Organizations should verify their current firmware versions and schedule maintenance windows to update all affected HMS Networks hardware to prevent potential remote takeover.