Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-41759— Use of wildcard (“*” or “all”) in Block list

CVSS 4.9 · Medium EPSS 0.01% · P3
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-41759

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Use of wildcard (“*” or “all”) in Block list
Source: NVD (National Vulnerability Database)
Vulnerability Description
An administrator may attempt to block all networks by specifying "\*" or "all" as the network identifier. However, these values are not supported and do not trigger any validation error. Instead, they are silently interpreted as network 0 which results in no networks being blocked at all.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
未能安全地进行程序失效(Failing Open)
Source: NVD (National Vulnerability Database)
Vulnerability Title
MBS多款产品 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
MBS UBR-01 Mk II等都是德国MBS公司的产品。MBS UBR-01 Mk II是一款远程基站设备。MBS UBR-02是一款远程基站设备。MBS UBR-LON是一款工业自动化系统的通信接口设备。 MBS多款产品存在安全漏洞,该漏洞源于网络标识符*或all未触发验证错误,可能导致网络阻塞功能失效。以下产品受到影响:MBS UBR-01 Mk II、MBS UBR-02和MBS UBR-LON。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
MBSUBR-01 Mk II 0.0.0 ~ 6.0.1.0 -
MBSUBR-02 0.0.0 ~ 6.0.1.0 -
MBSUBR-LON 0.0.0 ~ 6.0.1.0 -

II. Public POCs for CVE-2025-41759

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-41759

登录查看更多情报信息。

Same Patch Batch · MBS · 2026-03-09 · 15 CVEs total

CVE-2025-417649.1 CRITICALUnchecked role in wwwupdate.cgi
CVE-2025-417659.1 CRITICALUnchecked role in wwwupload.cgi
CVE-2025-417588.8 HIGHArbitrary Write with wwwupload.cgi
CVE-2025-417668.8 HIGHStack buffer overflow on parsing web request
CVE-2025-417578.8 HIGHArbitrary Write with ubr-restore
CVE-2025-417568.1 HIGHArbitrary Write with ubr-editfile
CVE-2025-417617.8 HIGHPrivilege escalation possible
CVE-2025-417727.5 HIGHwwwupdate.cgi Session token in URL
CVE-2025-417677.2 HIGHSignature bypass on update upload
CVE-2025-417636.5 MEDIUMUnchecked role in wwwdnload.cgi
CVE-2025-417546.5 MEDIUMArbitrary Read with ubr-editfile
CVE-2025-417556.5 MEDIUMArbitrary Read with ubr-logread
CVE-2025-417626.2 MEDIUMSecret leak with wwwdnload.cgi
CVE-2025-417604.9 MEDIUMPass filter with Empty Table

IV. Related Vulnerabilities

V. Comments for CVE-2025-41759

No comments yet


Leave a comment