top of page
perceptive_background_267k.jpg

An issue was discovered in Lantronix EDS3000PS 3.1.0.0R2. The host parameter of the TFTP client in the Filesystem Browser page is not properly sanitized. This c…

Published:

10 March 2026 at 23:00:00

Alert date:

11 March 2026 at 21:03:26

Source:

nvd.nist.gov

Click to open the original link from this advisory

Network Infrastructure, Critical Infrastructure, Mobile & IoT

A critical command injection vulnerability was discovered in Lantronix EDS3000PS version 3.1.0.0R2. The vulnerability exists in the TFTP client's host parameter within the Filesystem Browser page, which lacks proper input sanitization. Attackers can exploit this flaw to escape from the original command context and execute arbitrary commands with root privileges. This represents a severe security risk as it allows complete system compromise through privilege escalation. The vulnerability affects industrial network infrastructure devices commonly used in critical environments.

Technical details

Mitigation steps:

Affected products:

Lantronix EDS3000PS

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page