Cyber Posture

CVE-2026-25823

Critical

Published: 13 March 2026

Published
13 March 2026
Modified
27 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0028 51.2th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

HMS Networks Ewon Flexy with firmware before 15.0s4, Cosy+ with firmware 22.xx before 22.1s6, and Cosy+ with firmware 23.xx before 23.0s3 have a stack buffer overflow that leads to a Denial of Service, which can also be exploited to achieve…

more

Unauthenticated Remote Code Execution.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Mandates timely identification, reporting, and patching of the stack buffer overflow flaw via firmware updates to versions 15.0s4, 22.1s6, or 23.0s3.

prevent

Implements memory protections like stack canaries, ASLR, and DEP to block exploitation of the stack buffer overflow for remote code execution.

prevent

Enforces validation of remote network inputs to detect and reject malformed data causing the stack buffer overflow.

Security SummaryAI

CVE-2026-25823 is a stack buffer overflow vulnerability (CWE-121) in HMS Networks' Ewon Flexy and Cosy+ devices. It affects Ewon Flexy with firmware before version 15.0s4, Cosy+ with firmware 22.xx before 22.1s6, and Cosy+ with firmware 23.xx before 23.0s3. The issue enables denial of service and can be further exploited for unauthenticated remote code execution, earning a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Remote attackers require no privileges or user interaction to exploit the vulnerability over the network with low complexity. Exploitation can crash affected devices, causing denial of service, or achieve remote code execution, resulting in high impacts to confidentiality, integrity, and availability.

HMS Networks has published a security advisory detailing this and related vulnerabilities in Ewon Flexy and Cosy+ devices, available at https://hmsnetworks.blob.core.windows.net/nlw/docs/default-source/products/cybersecurity/security-advisory/hms-security-advisory-2026-03-09-001---ewon-several-flexy-and-cosy--vulnerabilities.pdf?sfvrsn=f7c027b8_13. Mitigation involves updating to the specified firmware versions: 15.0s4 for Ewon Flexy, 22.1s6 for Cosy+ 22.xx, and 23.0s3 for Cosy+ 23.xx. Additional product information is at https://www.hms-networks.com/p/flexy20500-00ma-ewon-flexy-205.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Stack buffer overflow vulnerability in public-facing HMS Networks Ewon Flexy and Cosy+ devices allows unauthenticated remote code execution over the network, directly enabling T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References