Vulnerability Description
Due to insufficient sanitization, an attacker can upload a specially crafted configuration file to traverse directories and achieve remote code execution with system-level permissions.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Advantech | Deviceon\/Iedge | <= 2.0.2 |
Related Weaknesses (CWE)
References
- https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2025/icsa-25-31Third Party Advisory
- https://www.advantech.com/emt/contactProduct
- https://www.cisa.gov/news-events/ics-advisories/icsa-25-310-01MitigationThird Party AdvisoryUS Government Resource
FAQ
What is CVE-2025-62630?
CVE-2025-62630 is a vulnerability with a CVSS score of 8.8 (HIGH). Due to insufficient sanitization, an attacker can upload a specially crafted configuration file to traverse directories and achieve remote code execution with system-level permissions.
How severe is CVE-2025-62630?
CVE-2025-62630 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-62630?
Check the references section above for vendor advisories and patch information. Affected products include: Advantech Deviceon\/Iedge.