top of page
perceptive_background_267k.jpg

An issue was discovered in Lantronix EDS3000PS 3.1.0.0R2. The host parameter of the TFTP client in the Filesystem Browser page is not properly sanitized. This c…

Published:

10 maart 2026 om 23:00:00

Alert date:

11 maart 2026 om 21:03:26

Source:

nvd.nist.gov

Click to open the original link from this advisory

Network Infrastructure, Critical Infrastructure, Mobile & IoT

A critical command injection vulnerability was discovered in Lantronix EDS3000PS version 3.1.0.0R2. The vulnerability exists in the TFTP client's host parameter within the Filesystem Browser page, which lacks proper input sanitization. Attackers can exploit this flaw to escape from the original command context and execute arbitrary commands with root privileges. This represents a severe security risk as it allows complete system compromise through privilege escalation. The vulnerability affects industrial network infrastructure devices commonly used in critical environments.

Technical details

Mitigation steps:

Affected products:

Lantronix EDS3000PS

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page