


Perceptive Security
SOC/SIEM Consultancy

An issue was discovered in Lantronix EDS3000PS 3.1.0.0R2. The host parameter of the TFTP client in the Filesystem Browser page is not properly sanitized. This c…
Published:
10 maart 2026 om 23:00:00
Alert date:
11 maart 2026 om 21:03:26
Source:
nvd.nist.gov
Network Infrastructure, Critical Infrastructure, Mobile & IoT
A critical command injection vulnerability was discovered in Lantronix EDS3000PS version 3.1.0.0R2. The vulnerability exists in the TFTP client's host parameter within the Filesystem Browser page, which lacks proper input sanitization. Attackers can exploit this flaw to escape from the original command context and execute arbitrary commands with root privileges. This represents a severe security risk as it allows complete system compromise through privilege escalation. The vulnerability affects industrial network infrastructure devices commonly used in critical environments.
Technical details
Mitigation steps:
Affected products:
Lantronix EDS3000PS
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2025-67041
http://eds3000ps.com
http://lantronix.com
https://www.cisa.gov/news-events/ics-advisories/icsa-26-069-02
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
