Zurück zur Übersicht

Helmholz: Sandbox escape in REX200/250 LUA interpreter

VDE-2025-069
Last update
31.07.2025 12:00
Published at
31.07.2025 12:00
Vendor(s)
Helmholz GmbH & Co. KG
External ID
VDE-2025-069
CSAF Document

Summary

An authenticated remote attacker can exploit an undocumented method to escape the LUA sandbox in REX200/250 devices, enabling the execution of arbitrary operating system commands and leading to full system compromise.

Impact

This vulnerability allows an authenticated remote attacker to fully compromise the system by executing arbitrary OS commands.

Affected Product(s)

Model no. Product name Affected versions
Helmholz REX 200/250 Firmware <7.3.0
Helmholz REX 300 Firmware <=5.1.11

Vulnerabilities

Expand / Collapse all

Published
22.09.2025 14:58
Weakness
Improper Isolation or Compartmentalization (CWE-653)
Summary

A high privileged remote attacker can execute arbitrary OS commands using an undocumented method allowing to escape the implemented LUA sandbox.

References

Remediation

Update REX 200/250 to at least version 7.3.0\
Note: REX 300 is EOL and will not receive any further updates.

Revision History

Version Date Summary
1 31.07.2025 12:00 Initial revision.