Vulnerability Description
An issue was discovered in Lantronix EDS3000PS 3.1.0.0R2. The authentication on management pages can be bypassed by appending a specific suffix to the URL and by sending an Authorization header that uses "admin" as the username.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lantronix | Eds3016Ps1Ns Firmware | 3.1.0.0 |
| Lantronix | Eds3016Ps1Ns | - |
| Lantronix | Eds3008Ps1Ns Firmware | 3.1.0.0 |
| Lantronix | Eds3008Ps1Ns | - |
Related Weaknesses (CWE)
References
- http://eds3000ps.comNot Applicable
- http://lantronix.comProduct
- https://www.cisa.gov/news-events/ics-advisories/icsa-26-069-02Third Party AdvisoryUS Government Resource
FAQ
What is CVE-2025-67039?
CVE-2025-67039 is a vulnerability with a CVSS score of 9.1 (CRITICAL). An issue was discovered in Lantronix EDS3000PS 3.1.0.0R2. The authentication on management pages can be bypassed by appending a specific suffix to the URL and by sending an Authorization header that u...
How severe is CVE-2025-67039?
CVE-2025-67039 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-67039?
Check the references section above for vendor advisories and patch information. Affected products include: Lantronix Eds3016Ps1Ns Firmware, Lantronix Eds3016Ps1Ns, Lantronix Eds3008Ps1Ns Firmware, Lantronix Eds3008Ps1Ns.