Moxa CVE-2025-6892, CVE-2025-6893, CVE-2025-6894, CVE-2025-6949, CVE-2025-6950: Multiple Vulnerabilities in Network Security Appliances and Routers
Five vulnerabilities have been identified in Moxa network security appliances and routers that allow unauthorized privilege escalation and access to protected API endpoints. CVE-2025-6892 exploits a flaw in API session validation that allows an authenticated user to bypass privilege boundaries and access administrative functions. CVE-2025-6893 allows a low-privileged authenticated user to call the /api/v1/setting/data endpoint without required permissions, enabling modification of system configuration. CVE-2025-6894 allows a low-privileged user to execute the restricted administrative ping function for internal network reconnaissance. CVE-2025-6949 and CVE-2025-6950 involve additional authorization bypass and privilege escalation issues in the affected appliances. No patches are available; the vendor has not released fixes for these products.
- Authenticated access to the Moxa appliance (valid user credentials or active session)
- Network access to the Moxa web interface or API endpoints (typically port 443 for HTTPS)
- Low-privilege user account (for CVE-2025-6893 and CVE-2025-6894); no privilege escalation needed for initial access
Patching may require device reboot — plan for process interruption
/api/v1/advisories/361ad53b-9a8e-4f4c-b43c-d3faa3a6a50eGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.