Moxa CVE-2025-6892, CVE-2025-6893, CVE-2025-6894, CVE-2025-6949, CVE-2025-6950: Multiple Vulnerabilities in Network Security Appliances and Routers
Five vulnerabilities identified in Moxa network security appliances and routers: CVE-2025-6892: Incorrect Authorization in API authentication allows unauthorized access to protected API endpoints including administrative functions after a legitimate user logs in. The system fails to properly validate session context or privilege boundaries, allowing attackers to perform unauthorized privileged operations. CVE-2025-6893: Execution with Unnecessary Privileges in /api/v1/setting/data endpoint allows low-privileged authenticated users to access or modify system configuration data without required permissions, leading to privilege escalation and access to sensitive system settings. CVE-2025-6894: Execution with Unnecessary Privileges in API authorization logic allows authenticated low-privileged users to execute administrative ping function restricted to higher-privileged roles, enabling internal network reconnaissance. CVE-2025-6949 and CVE-2025-6950: Additional vulnerabilities in network security appliances and routers (specific details not provided in advisory excerpt). All vulnerabilities affect network security appliances and routers across all versions. No patches are available from the vendor.
- Valid low-privileged user credentials for the Moxa appliance or router
- Network access to the device's API endpoints (typically port 443 or 8443 for HTTPS)
- Device must have API access enabled
Patching may require device reboot — plan for process interruption
/api/v1/advisories/361ad53b-9a8e-4f4c-b43c-d3faa3a6a50e