Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-11774— Malicious Code Execution Vulnerability in the Software Keyboard Function of GENESIS64, ICONICS Suite, Mobile HMI, and MC Works64

CVSS 8.2 · High EPSS 0.05% · P16
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-11774

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Malicious Code Execution Vulnerability in the Software Keyboard Function of GENESIS64, ICONICS Suite, Mobile HMI, and MC Works64
Source: NVD (National Vulnerability Database)
Vulnerability Description
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in the software keyboard function (hereinafter referred to as "keypad function") of Mitsubishi Electric GENESIS64 versions 10.97.2 CFR3 and prior, Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97.2 CFR3 and prior, Mitsubishi Electric ICONICS Suite versions 10.97.2 CFR3 and prior, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite versions 10.97.2 CFR3 and prior, Mitsubishi Electric MobileHMI versions 10.97.2 CFR3 and prior, Mitsubishi Electric Iconics Digital Solutions MobileHMI versions 10.97.2 CFR3 and prior, and Mitsubishi Electric MC Works64 all versions allows a local attacker to execute arbitrary executable files (EXE) when a legitimate user uses the keypad function by tampering with the configuration file for the function. This could allow the attacker to disclose, tamper with, delete, or destroy information stored on the PC where the affected product is installed, or cause a denial-of-service (DoS) condition on the system, through the execution of the EXE.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Mitsubishi Electric多款产品 操作系统命令注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Mitsubishi Electric MC Works64等都是日本三菱电机(Mitsubishi Electric)公司的产品。Mitsubishi Electric MC Works64是一套数据采集与监控系统(SCADA)。Mitsubishi Electric GENESIS64是一个 SCADA 套件。Mitsubishi Electric Iconics Digital Solutions是一个数字解决方案软件。 Mitsubishi Electric多款产品存在操作系统命令注入漏洞,该漏洞
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Mitsubishi Electric CorporationGENESIS64 Version 10.97.2 CFR3 and prior -
Mitsubishi Electric Iconics Digital SolutionsGENESIS64 Version 10.97.2 CFR3 and prior -
Mitsubishi Electric CorporationICONICS Suite Version 10.97.2 CFR3 and prior -
Mitsubishi Electric Iconics Digital SolutionsICONICS Suite Version 10.97.2 CFR3 and prior -
Mitsubishi Electric CorporationMobileHMI Version 10.97.2 CFR3 and prior -
Mitsubishi Electric Iconics Digital SolutionsMobileHMI Version 10.97.2 CFR3 and prior -
Mitsubishi Electric CorporationMC Works64 All versions -

II. Public POCs for CVE-2025-11774

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-11774

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2025-11774

No comments yet


Leave a comment