Search criteria Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.

12 vulnerabilities found for modulo 6 devices modu680-AS by Sauter

CVE-2025-41724 (GCVE-0-2025-41724)

Vulnerability from nvd – Published: 2025-10-22 07:03 – Updated: 2025-10-22 15:48
VLAI?
Title
Sauter: Crash via Incomplete SOAP Request
Summary
An unauthenticated remote attacker can crash the wscserver by sending incomplete SOAP requests. The wscserver process will not be restarted by a watchdog and a device reboot is necessary to make it work again.
CWE
  • CWE-239 - Failure to Handle Incomplete Element
Assigner
Impacted products
Vendor Product Version
Sauter modulo 6 devices modu680-AS Affected: 0.0.0 , < Firmware v3.2.0 (semver)
Create a notification for this product.
    Sauter modulo 6 devices modu660-AS Affected: 0.0.0 , < Firmware v3.2.0 (semver)
Create a notification for this product.
    Sauter modulo 6 devices modu612-LC Affected: 0.0.0 , < Firmware v3.2.0 (semver)
Create a notification for this product.
    Sauter EY-modulo 5 modu 5 modu524 Affected: 0.0 , < Firmware v6.0 (semver)
Create a notification for this product.
    Sauter EY-modulo 5 modu 5 modu525 Affected: 0.0 , < Firmware v6.0 (semver)
Create a notification for this product.
    Sauter EY-modulo 5 ecos 5 ecos504/505 Affected: 0.0 , < Firmware v6.0 (semver)
Create a notification for this product.
Credits
Damian Pfammatter, Daniel Hulliger from Cyber-Defence Campus armasuisse S+T
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41724",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-22T15:48:31.778178Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-22T15:48:40.087Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "modulo 6 devices modu680-AS",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v3.2.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "modulo 6 devices modu660-AS",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v3.2.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "modulo 6 devices modu612-LC",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v3.2.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EY-modulo 5 modu 5 modu524",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v6.0",
              "status": "affected",
              "version": "0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EY-modulo 5 modu 5 modu525",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v6.0",
              "status": "affected",
              "version": "0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EY-modulo 5 ecos 5 ecos504/505",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v6.0",
              "status": "affected",
              "version": "0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Damian Pfammatter, Daniel Hulliger from Cyber-Defence Campus armasuisse S+T"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An unauthenticated remote attacker can crash the wscserver by sending incomplete SOAP requests. The wscserver process will not be restarted by a watchdog and a device reboot is necessary to make it work again."
            }
          ],
          "value": "An unauthenticated remote attacker can crash the wscserver by sending incomplete SOAP requests. The wscserver process will not be restarted by a watchdog and a device reboot is necessary to make it work again."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-239",
              "description": "CWE-239:Failure to Handle Incomplete Element",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-22T07:03:50.109Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://sauter.csaf-tp.certvde.com/.well-known/csaf/white/2025/vde-2025-060.json"
        }
      ],
      "source": {
        "advisory": "VDE-2025-060",
        "defect": [
          "CERT@VDE#641818"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Sauter: Crash via Incomplete SOAP Request",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41724",
    "datePublished": "2025-10-22T07:03:50.109Z",
    "dateReserved": "2025-04-16T11:17:48.318Z",
    "dateUpdated": "2025-10-22T15:48:40.087Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-41723 (GCVE-0-2025-41723)

Vulnerability from nvd – Published: 2025-10-22 07:01 – Updated: 2025-10-22 13:28
VLAI?
Title
Sauter: Directory Traversal in importFile SOAP Method
Summary
The importFile SOAP method is vulnerable to a directory traversal attack. An unauthenticated remote attacker bypass the path restriction and upload files to arbitrary locations.
CWE
  • CWE-35 - Path Traversal: '.../...//'
Assigner
Impacted products
Vendor Product Version
Sauter modulo 6 devices modu680-AS Affected: 0.0.0 , < Firmware v3.2.0 (semver)
Create a notification for this product.
    Sauter modulo 6 devices modu660-AS Affected: 0.0.0 , < Firmware v3.2.0 (semver)
Create a notification for this product.
    Sauter modulo 6 devices modu612-LC Affected: 0.0.0 , < Firmware v3.2.0 (semver)
Create a notification for this product.
    Sauter EY-modulo 5 modu 5 modu524 Affected: 0.0 , < Firmware v6.0 (semver)
Create a notification for this product.
    Sauter EY-modulo 5 modu 5 modu525 Affected: 0.0 , < Firmware v6.0 (semver)
Create a notification for this product.
    Sauter EY-modulo 5 ecos 5 ecos504/505 Affected: 0.0 , < Firmware v6.0 (semver)
Create a notification for this product.
Credits
Damian Pfammatter, Daniel Hulliger from Cyber-Defence Campus armasuisse S+T
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41723",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-22T13:28:39.630438Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-22T13:28:51.323Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "modulo 6 devices modu680-AS",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v3.2.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "modulo 6 devices modu660-AS",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v3.2.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "modulo 6 devices modu612-LC",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v3.2.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EY-modulo 5 modu 5 modu524",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v6.0",
              "status": "affected",
              "version": "0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EY-modulo 5 modu 5 modu525",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v6.0",
              "status": "affected",
              "version": "0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EY-modulo 5 ecos 5 ecos504/505",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v6.0",
              "status": "affected",
              "version": "0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Damian Pfammatter, Daniel Hulliger from Cyber-Defence Campus armasuisse S+T"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eThe importFile SOAP method is vulnerable to a directory traversal attack. An unauthenticated remote attacker bypass the path restriction and upload files to arbitrary locations.\u003c/p\u003e"
            }
          ],
          "value": "The importFile SOAP method is vulnerable to a directory traversal attack. An unauthenticated remote attacker bypass the path restriction and upload files to arbitrary locations."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-35",
              "description": "CWE-35:Path Traversal: \u0027.../...//\u0027",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-22T07:01:09.768Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://sauter.csaf-tp.certvde.com/.well-known/csaf/white/2025/vde-2025-060.json"
        }
      ],
      "source": {
        "advisory": "VDE-2025-060",
        "defect": [
          "CERT@VDE#641818"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Sauter: Directory Traversal in importFile SOAP Method",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41723",
    "datePublished": "2025-10-22T07:01:09.768Z",
    "dateReserved": "2025-04-16T11:17:48.318Z",
    "dateUpdated": "2025-10-22T13:28:51.323Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-41722 (GCVE-0-2025-41722)

Vulnerability from nvd – Published: 2025-10-22 06:58 – Updated: 2025-10-22 13:30
VLAI?
Title
Sauter: Hard-coded Authentication Credentials
Summary
The wsc server uses a hard-coded certificate to check the authenticity of SOAP messages. An unauthenticated remote attacker can extract private keys from the Software of the affected devices.
CWE
  • CWE-798 - Use of Hard-coded Credentials
Assigner
Impacted products
Vendor Product Version
Sauter modulo 6 devices modu680-AS Affected: 0.0.0 , < Firmware v3.2.0 (semver)
Create a notification for this product.
    Sauter modulo 6 devices modu660-AS Affected: 0.0.0 , < Firmware v3.2.0 (semver)
Create a notification for this product.
    Sauter modulo 6 devices modu612-LC Affected: 0.0.0 , < Firmware v3.2.0 (semver)
Create a notification for this product.
    Sauter EY-modulo 5 modu 5 modu524 Affected: 0.0 , < Firmware v6.0 (semver)
Create a notification for this product.
    Sauter EY-modulo 5 modu 5 modu525 Affected: 0.0 , < Firmware v6.0 (semver)
Create a notification for this product.
    Sauter EY-modulo 5 ecos 5 ecos504/505 Affected: 0.0 , < Firmware v6.0 (semver)
Create a notification for this product.
Credits
Damian Pfammatter, Daniel Hulliger from Cyber-Defence Campus armasuisse S+T
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41722",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-22T13:29:56.589615Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-22T13:30:10.827Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "modulo 6 devices modu680-AS",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v3.2.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "modulo 6 devices modu660-AS",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v3.2.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "modulo 6 devices modu612-LC",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v3.2.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EY-modulo 5 modu 5 modu524",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v6.0",
              "status": "affected",
              "version": "0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EY-modulo 5 modu 5 modu525",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v6.0",
              "status": "affected",
              "version": "0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EY-modulo 5 ecos 5 ecos504/505",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v6.0",
              "status": "affected",
              "version": "0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Damian Pfammatter, Daniel Hulliger from Cyber-Defence Campus armasuisse S+T"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The wsc server uses a hard-coded certificate to check the authenticity of SOAP messages. An unauthenticated remote attacker can extract private keys from the Software of the affected devices."
            }
          ],
          "value": "The wsc server uses a hard-coded certificate to check the authenticity of SOAP messages. An unauthenticated remote attacker can extract private keys from the Software of the affected devices."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-798",
              "description": "CWE-798 Use of Hard-coded Credentials",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-22T06:58:31.679Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://sauter.csaf-tp.certvde.com/.well-known/csaf/white/2025/vde-2025-060.json"
        }
      ],
      "source": {
        "advisory": "VDE-2025-060",
        "defect": [
          "CERT@VDE#641818"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Sauter: Hard-coded Authentication Credentials",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41722",
    "datePublished": "2025-10-22T06:58:31.679Z",
    "dateReserved": "2025-04-16T11:17:48.317Z",
    "dateUpdated": "2025-10-22T13:30:10.827Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-41721 (GCVE-0-2025-41721)

Vulnerability from nvd – Published: 2025-10-22 06:55 – Updated: 2025-10-22 13:31
VLAI?
Title
Sauter: Command Injection
Summary
A high privileged remote attacker can influence the parameters passed to the openssl command due to improper neutralization of special elements when adding a password protected self-signed certificate.
CWE
  • CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')
Assigner
Impacted products
Vendor Product Version
Sauter modulo 6 devices modu680-AS Affected: 0.0.0 , < Firmware v3.2.0 (semver)
Create a notification for this product.
    Sauter modulo 6 devices modu660-AS Affected: 0.0.0 , < Firmware v3.2.0 (semver)
Create a notification for this product.
    Sauter modulo 6 devices modu612-LC Affected: 0.0.0 , < Firmware v3.2.0 (semver)
Create a notification for this product.
    Sauter EY-modulo 5 modu 5 modu524 Affected: 0.0 , < Firmware v6.0 (semver)
Create a notification for this product.
    Sauter EY-modulo 5 modu 5 modu525 Affected: 0.0 , < Firmware v6.0 (semver)
Create a notification for this product.
    Sauter EY-modulo 5 ecos 5 ecos504/505 Affected: 0.0 , < Firmware v6.0 (semver)
Create a notification for this product.
Credits
Damian Pfammatter, Daniel Hulliger from Cyber-Defence Campus armasuisse S+T
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41721",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-22T13:31:24.266594Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-22T13:31:30.683Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "modulo 6 devices modu680-AS",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v3.2.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "modulo 6 devices modu660-AS",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v3.2.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "modulo 6 devices modu612-LC",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v3.2.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EY-modulo 5 modu 5 modu524",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v6.0",
              "status": "affected",
              "version": "0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EY-modulo 5 modu 5 modu525",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v6.0",
              "status": "affected",
              "version": "0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EY-modulo 5 ecos 5 ecos504/505",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v6.0",
              "status": "affected",
              "version": "0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Damian Pfammatter, Daniel Hulliger from Cyber-Defence Campus armasuisse S+T"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A high privileged remote attacker can influence the parameters passed to the openssl command due to improper neutralization of special elements when adding a password protected self-signed certificate."
            }
          ],
          "value": "A high privileged remote attacker can influence the parameters passed to the openssl command due to improper neutralization of special elements when adding a password protected self-signed certificate."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 2.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-77",
              "description": "CWE-77:Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-22T06:55:22.860Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://sauter.csaf-tp.certvde.com/.well-known/csaf/white/2025/vde-2025-060.json"
        }
      ],
      "source": {
        "advisory": "VDE-2025-060",
        "defect": [
          "CERT@VDE#641818"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Sauter: Command Injection",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41721",
    "datePublished": "2025-10-22T06:55:22.860Z",
    "dateReserved": "2025-04-16T11:17:48.317Z",
    "dateUpdated": "2025-10-22T13:31:30.683Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-41720 (GCVE-0-2025-41720)

Vulnerability from nvd – Published: 2025-10-22 06:52 – Updated: 2025-10-22 15:48
VLAI?
Title
Sauter: Arbitrary File Upload
Summary
A low privileged remote attacker can upload arbitrary data masked as a png file to the affected device using the webserver API because only the file extension is verified.
CWE
  • CWE-646 - Reliance on File Name or Extension of Externally-Supplied File
Assigner
Impacted products
Vendor Product Version
Sauter modulo 6 devices modu680-AS Affected: 0.0.0 , < Firmware v3.2.0 (semver)
Create a notification for this product.
    Sauter modulo 6 devices modu660-AS Affected: 0.0.0 , < Firmware v3.2.0 (semver)
Create a notification for this product.
    Sauter modulo 6 devices modu612-LC Affected: 0.0.0 , < Firmware v3.2.0 (semver)
Create a notification for this product.
    Sauter EY-modulo 5 modu 5 modu524 Affected: 0.0 , < Firmware v6.0 (semver)
Create a notification for this product.
    Sauter EY-modulo 5 modu 5 modu525 Affected: 0.0 , < Firmware v6.0 (semver)
Create a notification for this product.
    Sauter EY-modulo 5 ecos 5 ecos504/505 Affected: 0.0 , < Firmware v6.0 (semver)
Create a notification for this product.
Credits
Damian Pfammatter, Daniel Hulliger from Cyber-Defence Campus armasuisse
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41720",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-22T15:47:55.751768Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-22T15:48:07.323Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "modulo 6 devices modu680-AS",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v3.2.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "modulo 6 devices modu660-AS",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v3.2.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "modulo 6 devices modu612-LC",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v3.2.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EY-modulo 5 modu 5 modu524",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v6.0",
              "status": "affected",
              "version": "0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EY-modulo 5 modu 5 modu525",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v6.0",
              "status": "affected",
              "version": "0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EY-modulo 5 ecos 5 ecos504/505",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v6.0",
              "status": "affected",
              "version": "0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Damian Pfammatter, Daniel Hulliger from Cyber-Defence Campus armasuisse"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A low privileged remote attacker can upload arbitrary data masked as a png file to the affected device using the webserver API because only the file extension is verified."
            }
          ],
          "value": "A low privileged remote attacker can upload arbitrary data masked as a png file to the affected device using the webserver API because only the file extension is verified."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-646",
              "description": "CWE-646:Reliance on File Name or Extension of Externally-Supplied File",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-22T06:52:03.019Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://sauter.csaf-tp.certvde.com/.well-known/csaf/white/2025/vde-2025-060.json"
        }
      ],
      "source": {
        "advisory": "VDE-2025-060",
        "defect": [
          "CERT@VDE#641818"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Sauter: Arbitrary File Upload",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41720",
    "datePublished": "2025-10-22T06:52:03.019Z",
    "dateReserved": "2025-04-16T11:17:48.313Z",
    "dateUpdated": "2025-10-22T15:48:07.323Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-41719 (GCVE-0-2025-41719)

Vulnerability from nvd – Published: 2025-10-22 06:48 – Updated: 2025-10-22 15:47
VLAI?
Title
Sauter: Improper Validation of user-controlled data
Summary
A low privileged remote attacker can corrupt the webserver users storage on the device by setting a sequence of unsupported characters which leads to deletion of all previously configured users and the creation of the default Administrator with a known default password.
CWE
  • CWE-1286 - Improper Validation of Syntactic Correctness of Input
Assigner
Impacted products
Vendor Product Version
Sauter modulo 6 devices modu680-AS Affected: 0.0.0 , < Firmware v3.2.0 (semver)
Create a notification for this product.
    Sauter modulo 6 devices modu660-AS Affected: 0.0.0 , < Firmware v3.2.0 (semver)
Create a notification for this product.
    Sauter modulo 6 devices modu612-LC Affected: 0.0.0 , < Firmware v3.2.0 (semver)
Create a notification for this product.
    Sauter EY-modulo 5 modu 5 modu524 Affected: 0.0 , < Firmware v6.0 (semver)
Create a notification for this product.
    Sauter EY-modulo 5 modu 5 modu525 Affected: 0.0 , < Firmware v6.0 (semver)
Create a notification for this product.
    Sauter EY-modulo 5 ecos 5 ecos504/505 Affected: 0.0 , < Firmware v6.0 (semver)
Create a notification for this product.
Credits
Damian Pfammatter, Daniel Hulliger from Cyber-Defence Campus armasuisse
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41719",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-22T15:47:18.799189Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-22T15:47:29.413Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "modulo 6 devices modu680-AS",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v3.2.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "modulo 6 devices modu660-AS",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v3.2.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "modulo 6 devices modu612-LC",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v3.2.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EY-modulo 5 modu 5 modu524",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v6.0",
              "status": "affected",
              "version": "0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EY-modulo 5 modu 5 modu525",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v6.0",
              "status": "affected",
              "version": "0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EY-modulo 5 ecos 5 ecos504/505",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v6.0",
              "status": "affected",
              "version": "0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Damian Pfammatter, Daniel Hulliger from Cyber-Defence Campus armasuisse"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A low privileged remote attacker can corrupt the webserver users storage on the device by setting a sequence of unsupported characters which leads to deletion of all previously configured users and the creation of the default Administrator with a known default password."
            }
          ],
          "value": "A low privileged remote attacker can corrupt the webserver users storage on the device by setting a sequence of unsupported characters which leads to deletion of all previously configured users and the creation of the default Administrator with a known default password."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1286",
              "description": "CWE-1286:Improper Validation of Syntactic Correctness of Input",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-22T06:48:30.796Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://sauter.csaf-tp.certvde.com/.well-known/csaf/white/2025/vde-2025-060.json"
        }
      ],
      "source": {
        "advisory": "VDE-2025-060",
        "defect": [
          "CERT@VDE#641818"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Sauter: Improper Validation of user-controlled data",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41719",
    "datePublished": "2025-10-22T06:48:30.796Z",
    "dateReserved": "2025-04-16T11:17:48.313Z",
    "dateUpdated": "2025-10-22T15:47:29.413Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-41724 (GCVE-0-2025-41724)

Vulnerability from cvelistv5 – Published: 2025-10-22 07:03 – Updated: 2025-10-22 15:48
VLAI?
Title
Sauter: Crash via Incomplete SOAP Request
Summary
An unauthenticated remote attacker can crash the wscserver by sending incomplete SOAP requests. The wscserver process will not be restarted by a watchdog and a device reboot is necessary to make it work again.
CWE
  • CWE-239 - Failure to Handle Incomplete Element
Assigner
Impacted products
Vendor Product Version
Sauter modulo 6 devices modu680-AS Affected: 0.0.0 , < Firmware v3.2.0 (semver)
Create a notification for this product.
    Sauter modulo 6 devices modu660-AS Affected: 0.0.0 , < Firmware v3.2.0 (semver)
Create a notification for this product.
    Sauter modulo 6 devices modu612-LC Affected: 0.0.0 , < Firmware v3.2.0 (semver)
Create a notification for this product.
    Sauter EY-modulo 5 modu 5 modu524 Affected: 0.0 , < Firmware v6.0 (semver)
Create a notification for this product.
    Sauter EY-modulo 5 modu 5 modu525 Affected: 0.0 , < Firmware v6.0 (semver)
Create a notification for this product.
    Sauter EY-modulo 5 ecos 5 ecos504/505 Affected: 0.0 , < Firmware v6.0 (semver)
Create a notification for this product.
Credits
Damian Pfammatter, Daniel Hulliger from Cyber-Defence Campus armasuisse S+T
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41724",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-22T15:48:31.778178Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-22T15:48:40.087Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "modulo 6 devices modu680-AS",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v3.2.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "modulo 6 devices modu660-AS",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v3.2.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "modulo 6 devices modu612-LC",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v3.2.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EY-modulo 5 modu 5 modu524",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v6.0",
              "status": "affected",
              "version": "0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EY-modulo 5 modu 5 modu525",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v6.0",
              "status": "affected",
              "version": "0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EY-modulo 5 ecos 5 ecos504/505",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v6.0",
              "status": "affected",
              "version": "0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Damian Pfammatter, Daniel Hulliger from Cyber-Defence Campus armasuisse S+T"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An unauthenticated remote attacker can crash the wscserver by sending incomplete SOAP requests. The wscserver process will not be restarted by a watchdog and a device reboot is necessary to make it work again."
            }
          ],
          "value": "An unauthenticated remote attacker can crash the wscserver by sending incomplete SOAP requests. The wscserver process will not be restarted by a watchdog and a device reboot is necessary to make it work again."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-239",
              "description": "CWE-239:Failure to Handle Incomplete Element",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-22T07:03:50.109Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://sauter.csaf-tp.certvde.com/.well-known/csaf/white/2025/vde-2025-060.json"
        }
      ],
      "source": {
        "advisory": "VDE-2025-060",
        "defect": [
          "CERT@VDE#641818"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Sauter: Crash via Incomplete SOAP Request",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41724",
    "datePublished": "2025-10-22T07:03:50.109Z",
    "dateReserved": "2025-04-16T11:17:48.318Z",
    "dateUpdated": "2025-10-22T15:48:40.087Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-41723 (GCVE-0-2025-41723)

Vulnerability from cvelistv5 – Published: 2025-10-22 07:01 – Updated: 2025-10-22 13:28
VLAI?
Title
Sauter: Directory Traversal in importFile SOAP Method
Summary
The importFile SOAP method is vulnerable to a directory traversal attack. An unauthenticated remote attacker bypass the path restriction and upload files to arbitrary locations.
CWE
  • CWE-35 - Path Traversal: '.../...//'
Assigner
Impacted products
Vendor Product Version
Sauter modulo 6 devices modu680-AS Affected: 0.0.0 , < Firmware v3.2.0 (semver)
Create a notification for this product.
    Sauter modulo 6 devices modu660-AS Affected: 0.0.0 , < Firmware v3.2.0 (semver)
Create a notification for this product.
    Sauter modulo 6 devices modu612-LC Affected: 0.0.0 , < Firmware v3.2.0 (semver)
Create a notification for this product.
    Sauter EY-modulo 5 modu 5 modu524 Affected: 0.0 , < Firmware v6.0 (semver)
Create a notification for this product.
    Sauter EY-modulo 5 modu 5 modu525 Affected: 0.0 , < Firmware v6.0 (semver)
Create a notification for this product.
    Sauter EY-modulo 5 ecos 5 ecos504/505 Affected: 0.0 , < Firmware v6.0 (semver)
Create a notification for this product.
Credits
Damian Pfammatter, Daniel Hulliger from Cyber-Defence Campus armasuisse S+T
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41723",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-22T13:28:39.630438Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-22T13:28:51.323Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "modulo 6 devices modu680-AS",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v3.2.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "modulo 6 devices modu660-AS",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v3.2.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "modulo 6 devices modu612-LC",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v3.2.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EY-modulo 5 modu 5 modu524",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v6.0",
              "status": "affected",
              "version": "0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EY-modulo 5 modu 5 modu525",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v6.0",
              "status": "affected",
              "version": "0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EY-modulo 5 ecos 5 ecos504/505",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v6.0",
              "status": "affected",
              "version": "0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Damian Pfammatter, Daniel Hulliger from Cyber-Defence Campus armasuisse S+T"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eThe importFile SOAP method is vulnerable to a directory traversal attack. An unauthenticated remote attacker bypass the path restriction and upload files to arbitrary locations.\u003c/p\u003e"
            }
          ],
          "value": "The importFile SOAP method is vulnerable to a directory traversal attack. An unauthenticated remote attacker bypass the path restriction and upload files to arbitrary locations."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-35",
              "description": "CWE-35:Path Traversal: \u0027.../...//\u0027",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-22T07:01:09.768Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://sauter.csaf-tp.certvde.com/.well-known/csaf/white/2025/vde-2025-060.json"
        }
      ],
      "source": {
        "advisory": "VDE-2025-060",
        "defect": [
          "CERT@VDE#641818"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Sauter: Directory Traversal in importFile SOAP Method",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41723",
    "datePublished": "2025-10-22T07:01:09.768Z",
    "dateReserved": "2025-04-16T11:17:48.318Z",
    "dateUpdated": "2025-10-22T13:28:51.323Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-41722 (GCVE-0-2025-41722)

Vulnerability from cvelistv5 – Published: 2025-10-22 06:58 – Updated: 2025-10-22 13:30
VLAI?
Title
Sauter: Hard-coded Authentication Credentials
Summary
The wsc server uses a hard-coded certificate to check the authenticity of SOAP messages. An unauthenticated remote attacker can extract private keys from the Software of the affected devices.
CWE
  • CWE-798 - Use of Hard-coded Credentials
Assigner
Impacted products
Vendor Product Version
Sauter modulo 6 devices modu680-AS Affected: 0.0.0 , < Firmware v3.2.0 (semver)
Create a notification for this product.
    Sauter modulo 6 devices modu660-AS Affected: 0.0.0 , < Firmware v3.2.0 (semver)
Create a notification for this product.
    Sauter modulo 6 devices modu612-LC Affected: 0.0.0 , < Firmware v3.2.0 (semver)
Create a notification for this product.
    Sauter EY-modulo 5 modu 5 modu524 Affected: 0.0 , < Firmware v6.0 (semver)
Create a notification for this product.
    Sauter EY-modulo 5 modu 5 modu525 Affected: 0.0 , < Firmware v6.0 (semver)
Create a notification for this product.
    Sauter EY-modulo 5 ecos 5 ecos504/505 Affected: 0.0 , < Firmware v6.0 (semver)
Create a notification for this product.
Credits
Damian Pfammatter, Daniel Hulliger from Cyber-Defence Campus armasuisse S+T
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41722",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-22T13:29:56.589615Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-22T13:30:10.827Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "modulo 6 devices modu680-AS",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v3.2.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "modulo 6 devices modu660-AS",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v3.2.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "modulo 6 devices modu612-LC",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v3.2.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EY-modulo 5 modu 5 modu524",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v6.0",
              "status": "affected",
              "version": "0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EY-modulo 5 modu 5 modu525",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v6.0",
              "status": "affected",
              "version": "0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EY-modulo 5 ecos 5 ecos504/505",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v6.0",
              "status": "affected",
              "version": "0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Damian Pfammatter, Daniel Hulliger from Cyber-Defence Campus armasuisse S+T"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The wsc server uses a hard-coded certificate to check the authenticity of SOAP messages. An unauthenticated remote attacker can extract private keys from the Software of the affected devices."
            }
          ],
          "value": "The wsc server uses a hard-coded certificate to check the authenticity of SOAP messages. An unauthenticated remote attacker can extract private keys from the Software of the affected devices."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-798",
              "description": "CWE-798 Use of Hard-coded Credentials",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-22T06:58:31.679Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://sauter.csaf-tp.certvde.com/.well-known/csaf/white/2025/vde-2025-060.json"
        }
      ],
      "source": {
        "advisory": "VDE-2025-060",
        "defect": [
          "CERT@VDE#641818"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Sauter: Hard-coded Authentication Credentials",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41722",
    "datePublished": "2025-10-22T06:58:31.679Z",
    "dateReserved": "2025-04-16T11:17:48.317Z",
    "dateUpdated": "2025-10-22T13:30:10.827Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-41721 (GCVE-0-2025-41721)

Vulnerability from cvelistv5 – Published: 2025-10-22 06:55 – Updated: 2025-10-22 13:31
VLAI?
Title
Sauter: Command Injection
Summary
A high privileged remote attacker can influence the parameters passed to the openssl command due to improper neutralization of special elements when adding a password protected self-signed certificate.
CWE
  • CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')
Assigner
Impacted products
Vendor Product Version
Sauter modulo 6 devices modu680-AS Affected: 0.0.0 , < Firmware v3.2.0 (semver)
Create a notification for this product.
    Sauter modulo 6 devices modu660-AS Affected: 0.0.0 , < Firmware v3.2.0 (semver)
Create a notification for this product.
    Sauter modulo 6 devices modu612-LC Affected: 0.0.0 , < Firmware v3.2.0 (semver)
Create a notification for this product.
    Sauter EY-modulo 5 modu 5 modu524 Affected: 0.0 , < Firmware v6.0 (semver)
Create a notification for this product.
    Sauter EY-modulo 5 modu 5 modu525 Affected: 0.0 , < Firmware v6.0 (semver)
Create a notification for this product.
    Sauter EY-modulo 5 ecos 5 ecos504/505 Affected: 0.0 , < Firmware v6.0 (semver)
Create a notification for this product.
Credits
Damian Pfammatter, Daniel Hulliger from Cyber-Defence Campus armasuisse S+T
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41721",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-22T13:31:24.266594Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-22T13:31:30.683Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "modulo 6 devices modu680-AS",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v3.2.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "modulo 6 devices modu660-AS",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v3.2.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "modulo 6 devices modu612-LC",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v3.2.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EY-modulo 5 modu 5 modu524",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v6.0",
              "status": "affected",
              "version": "0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EY-modulo 5 modu 5 modu525",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v6.0",
              "status": "affected",
              "version": "0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EY-modulo 5 ecos 5 ecos504/505",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v6.0",
              "status": "affected",
              "version": "0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Damian Pfammatter, Daniel Hulliger from Cyber-Defence Campus armasuisse S+T"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A high privileged remote attacker can influence the parameters passed to the openssl command due to improper neutralization of special elements when adding a password protected self-signed certificate."
            }
          ],
          "value": "A high privileged remote attacker can influence the parameters passed to the openssl command due to improper neutralization of special elements when adding a password protected self-signed certificate."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 2.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-77",
              "description": "CWE-77:Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-22T06:55:22.860Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://sauter.csaf-tp.certvde.com/.well-known/csaf/white/2025/vde-2025-060.json"
        }
      ],
      "source": {
        "advisory": "VDE-2025-060",
        "defect": [
          "CERT@VDE#641818"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Sauter: Command Injection",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41721",
    "datePublished": "2025-10-22T06:55:22.860Z",
    "dateReserved": "2025-04-16T11:17:48.317Z",
    "dateUpdated": "2025-10-22T13:31:30.683Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-41720 (GCVE-0-2025-41720)

Vulnerability from cvelistv5 – Published: 2025-10-22 06:52 – Updated: 2025-10-22 15:48
VLAI?
Title
Sauter: Arbitrary File Upload
Summary
A low privileged remote attacker can upload arbitrary data masked as a png file to the affected device using the webserver API because only the file extension is verified.
CWE
  • CWE-646 - Reliance on File Name or Extension of Externally-Supplied File
Assigner
Impacted products
Vendor Product Version
Sauter modulo 6 devices modu680-AS Affected: 0.0.0 , < Firmware v3.2.0 (semver)
Create a notification for this product.
    Sauter modulo 6 devices modu660-AS Affected: 0.0.0 , < Firmware v3.2.0 (semver)
Create a notification for this product.
    Sauter modulo 6 devices modu612-LC Affected: 0.0.0 , < Firmware v3.2.0 (semver)
Create a notification for this product.
    Sauter EY-modulo 5 modu 5 modu524 Affected: 0.0 , < Firmware v6.0 (semver)
Create a notification for this product.
    Sauter EY-modulo 5 modu 5 modu525 Affected: 0.0 , < Firmware v6.0 (semver)
Create a notification for this product.
    Sauter EY-modulo 5 ecos 5 ecos504/505 Affected: 0.0 , < Firmware v6.0 (semver)
Create a notification for this product.
Credits
Damian Pfammatter, Daniel Hulliger from Cyber-Defence Campus armasuisse
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41720",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-22T15:47:55.751768Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-22T15:48:07.323Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "modulo 6 devices modu680-AS",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v3.2.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "modulo 6 devices modu660-AS",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v3.2.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "modulo 6 devices modu612-LC",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v3.2.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EY-modulo 5 modu 5 modu524",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v6.0",
              "status": "affected",
              "version": "0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EY-modulo 5 modu 5 modu525",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v6.0",
              "status": "affected",
              "version": "0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EY-modulo 5 ecos 5 ecos504/505",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v6.0",
              "status": "affected",
              "version": "0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Damian Pfammatter, Daniel Hulliger from Cyber-Defence Campus armasuisse"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A low privileged remote attacker can upload arbitrary data masked as a png file to the affected device using the webserver API because only the file extension is verified."
            }
          ],
          "value": "A low privileged remote attacker can upload arbitrary data masked as a png file to the affected device using the webserver API because only the file extension is verified."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-646",
              "description": "CWE-646:Reliance on File Name or Extension of Externally-Supplied File",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-22T06:52:03.019Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://sauter.csaf-tp.certvde.com/.well-known/csaf/white/2025/vde-2025-060.json"
        }
      ],
      "source": {
        "advisory": "VDE-2025-060",
        "defect": [
          "CERT@VDE#641818"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Sauter: Arbitrary File Upload",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41720",
    "datePublished": "2025-10-22T06:52:03.019Z",
    "dateReserved": "2025-04-16T11:17:48.313Z",
    "dateUpdated": "2025-10-22T15:48:07.323Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-41719 (GCVE-0-2025-41719)

Vulnerability from cvelistv5 – Published: 2025-10-22 06:48 – Updated: 2025-10-22 15:47
VLAI?
Title
Sauter: Improper Validation of user-controlled data
Summary
A low privileged remote attacker can corrupt the webserver users storage on the device by setting a sequence of unsupported characters which leads to deletion of all previously configured users and the creation of the default Administrator with a known default password.
CWE
  • CWE-1286 - Improper Validation of Syntactic Correctness of Input
Assigner
Impacted products
Vendor Product Version
Sauter modulo 6 devices modu680-AS Affected: 0.0.0 , < Firmware v3.2.0 (semver)
Create a notification for this product.
    Sauter modulo 6 devices modu660-AS Affected: 0.0.0 , < Firmware v3.2.0 (semver)
Create a notification for this product.
    Sauter modulo 6 devices modu612-LC Affected: 0.0.0 , < Firmware v3.2.0 (semver)
Create a notification for this product.
    Sauter EY-modulo 5 modu 5 modu524 Affected: 0.0 , < Firmware v6.0 (semver)
Create a notification for this product.
    Sauter EY-modulo 5 modu 5 modu525 Affected: 0.0 , < Firmware v6.0 (semver)
Create a notification for this product.
    Sauter EY-modulo 5 ecos 5 ecos504/505 Affected: 0.0 , < Firmware v6.0 (semver)
Create a notification for this product.
Credits
Damian Pfammatter, Daniel Hulliger from Cyber-Defence Campus armasuisse
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41719",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-22T15:47:18.799189Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-22T15:47:29.413Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "modulo 6 devices modu680-AS",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v3.2.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "modulo 6 devices modu660-AS",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v3.2.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "modulo 6 devices modu612-LC",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v3.2.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EY-modulo 5 modu 5 modu524",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v6.0",
              "status": "affected",
              "version": "0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EY-modulo 5 modu 5 modu525",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v6.0",
              "status": "affected",
              "version": "0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "EY-modulo 5 ecos 5 ecos504/505",
          "vendor": "Sauter",
          "versions": [
            {
              "lessThan": "Firmware v6.0",
              "status": "affected",
              "version": "0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Damian Pfammatter, Daniel Hulliger from Cyber-Defence Campus armasuisse"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A low privileged remote attacker can corrupt the webserver users storage on the device by setting a sequence of unsupported characters which leads to deletion of all previously configured users and the creation of the default Administrator with a known default password."
            }
          ],
          "value": "A low privileged remote attacker can corrupt the webserver users storage on the device by setting a sequence of unsupported characters which leads to deletion of all previously configured users and the creation of the default Administrator with a known default password."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1286",
              "description": "CWE-1286:Improper Validation of Syntactic Correctness of Input",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-22T06:48:30.796Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://sauter.csaf-tp.certvde.com/.well-known/csaf/white/2025/vde-2025-060.json"
        }
      ],
      "source": {
        "advisory": "VDE-2025-060",
        "defect": [
          "CERT@VDE#641818"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Sauter: Improper Validation of user-controlled data",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41719",
    "datePublished": "2025-10-22T06:48:30.796Z",
    "dateReserved": "2025-04-16T11:17:48.313Z",
    "dateUpdated": "2025-10-22T15:47:29.413Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}