A vulnerability exists in Advantech iView that allows for SQL injection
and remote code execution through NetworkServlet.archiveTrap(). This
issue requires an authenticated attacker with at least user-level
privileges. Certain input parameters are not sanitized, allowing an
attacker to perform SQL injection and potentially execute code in the
context of the 'nt authority\local service' account.
References
Link | Resource |
---|---|
https://www.advantech.com/en/support/details/firmware-?id=1-HIPU-183 | Product |
https://www.cisa.gov/news-events/ics-advisories/icsa-25-191-08 | Third Party Advisory US Government Resource |
Configurations
History
01 Aug 2025, 19:13
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:advantech:iview:*:*:*:*:*:*:*:* | |
First Time |
Advantech
Advantech iview |
|
References | () https://www.advantech.com/en/support/details/firmware-?id=1-HIPU-183 - Product | |
References | () https://www.cisa.gov/news-events/ics-advisories/icsa-25-191-08 - Third Party Advisory, US Government Resource |
15 Jul 2025, 13:14
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
11 Jul 2025, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-11 00:15
Updated : 2025-08-01 19:13
NVD link : CVE-2025-53515
Mitre link : CVE-2025-53515
CVE.ORG link : CVE-2025-53515
JSON object : View
Products Affected
advantech
- iview
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')