Cyber Posture

CVE-2025-41733

Critical

Published: 18 November 2025

Published
18 November 2025
Modified
21 November 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0012 30.0th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

The commissioning wizard on the affected devices does not validate if the device is already initialized. An unauthenticated remote attacker can construct POST requests to set root credentials.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prohibits permitting sensitive actions like setting root credentials via the commissioning wizard without identification or authentication.

prevent

Requires validation of inputs to the commissioning wizard, including device initialization state, to block crafted POST requests from succeeding.

prevent

Enforces access authorizations on public web interfaces like the commissioning wizard to prevent unauthenticated remote exploitation.

Security SummaryAI

CVE-2025-41733 affects the commissioning wizard on vulnerable devices, where it fails to validate if the device is already initialized. This authentication bypass vulnerability, mapped to CWE-305, enables an unauthenticated remote attacker to construct POST requests that set root credentials. Published on 2025-11-18 with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), it poses a critical risk due to its network accessibility and lack of privileges or user interaction required.

An unauthenticated attacker with network access to the device can exploit this by sending crafted POST requests to the commissioning wizard interface. Exploitation grants root-level credentials, allowing full compromise of confidentiality, integrity, and availability on the target device.

Mitigation details are available in the CERT VDE advisory at https://certvde.com/de/advisories/VDE-2025-097.

Details

CWE(s)

Affected Products

metz-connect
ewio2-m firmware
≤ 2.2.0
metz-connect
ewio2-m-bm firmware
≤ 2.2.0
metz-connect
ewio2-bm firmware
≤ 2.2.0

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

The vulnerability allows unauthenticated remote exploitation of a network-accessible commissioning wizard (public-facing application) via crafted POST requests to bypass authentication and set root credentials, enabling privilege escalation to root-level access.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References