Article No° | Product Name | Affected Version(s) |
---|---|---|
IE-SR-2TX-WL | < V1.49 | |
IE-SR-2TX-WL-4G-EU | < V1.62 | |
IE-SR-2TX-WL-4G-US-V | < V1.62 |
Weidmueller security routers IE-SR-2TX are affected by multiple vulnerabilities (CVE-2025-41661, CVE-2025-41663, CVE-2025-41683, CVE-2025-41684, CVE-2025-41687).
Weidmueller has released new firmware versions of the affected products to fix the vulnerabilities.
Update Version 1.1.0, 23.07.2025: Added CVEs CVE-2025-41683, CVE-2025-41684 and CVE-2025-41687. Updated CVSS Score for CVE-2025-41663. Removed CVE-2025-41662.
For u-link Management API an unauthenticated remote attacker in a man-in-the-middle position can inject arbitrary commands in responses returned by WWH servers, which are then executed with elevated privileges. To get into such a position, clients would need to use insecure proxy configurations.
An unauthenticated remote attacker may use a stack based buffer overflow in the u-link Management API to gain full access on the affected devices.
An unauthenticated remote attacker can execute arbitrary commands with root privileges on affected devices due to lack of Cross-Site Request Forgery (CSRF) protection.
An authenticated remote attacker can execute arbitrary commands with root privileges on affected devices due to lack of improper sanitizing of user input in the Main Web Interface (endpoint event_mail_test).
An authenticated remote attacker can execute arbitrary commands with root privileges on affected devices due to lack of improper sanitizing of user input in the Main Web Interface (endpoint tls_iotgen_setting).
Weidmueller security routers are vulnerable to multiple vulnerabilities, that may lead to execution of arbitrary commands on affected devices with root privileges.
Further information can be found under vulnerability details.
Remediation
Update to the new version as listed in the following table:
Product | Affected Version | Fixed Version |
IE-SR-2TX-WL |
<V1.49 |
V1.49 |
IE-SR-2TX-WL-4G-EU |
<V1.62 | V1.62 |
IE-SR-2TX-WL-4G-US-V |
<V1.62 | V1.62 |
General Recommendation
As a general security measure, Weidmueller strongly recommends to change the default passwords and to minimize the network exposure of products. Limit access to trusted networks by using the appropriate mechanisms.
CERT@VDE coordinated with Weidmueller.
Weidmueller thanks ONEKEY Research Labs for Coordinated Disclosure.
Weidmueller thanks Reid Wightman of Dragos Inc. for Coordinated Disclosure.