Refine your search

2 vulnerabilities found for MeteoBridge by Smartbedded

CVE-2025-4008 (GCVE-0-2025-4008)
Vulnerability from nvd
Published
2025-05-21 15:31
Modified
2025-10-21 22:55
CWE
  • CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')
  • CWE-306 - Missing Authentication for Critical Function
Summary
The Meteobridge web interface let meteobridge administrator manage their weather station data collection and administer their meteobridge system through a web application written in CGI shell scripts and C. This web interface exposes an endpoint that is vulnerable to command injection. Remote unauthenticated attackers can gain arbitrary command execution with elevated privileges ( root ) on affected devices.
Impacted products
Vendor Product Version
Smartbedded MeteoBridge Version: 0    6.1
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-4008",
                "options": [
                  {
                    "Exploitation": "active"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-02T03:55:47.221471Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          },
          {
            "other": {
              "content": {
                "dateAdded": "2025-10-02",
                "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-4008"
              },
              "type": "kev"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-21T22:55:14.636Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "government-resource"
            ],
            "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-4008"
          }
        ],
        "timeline": [
          {
            "lang": "en",
            "time": "2025-10-02T00:00:00+00:00",
            "value": "CVE-2025-4008 added to CISA KEV"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "MeteoBridge",
          "vendor": "Smartbedded",
          "versions": [
            {
              "lessThanOrEqual": "6.1",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "ONEKEY Research Labs"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The Meteobridge web interface let meteobridge administrator manage their weather station data collection and administer their meteobridge system through a web application written in CGI shell scripts and C.\u003cbr\u003e\u003cbr\u003eThis web interface exposes an endpoint that is vulnerable to command injection.\u003cbr\u003e\u003cbr\u003eRemote unauthenticated attackers can gain arbitrary command execution with elevated privileges ( root ) on affected devices.\u003cbr\u003e"
            }
          ],
          "value": "The Meteobridge web interface let meteobridge administrator manage their weather station data collection and administer their meteobridge system through a web application written in CGI shell scripts and C.\n\nThis web interface exposes an endpoint that is vulnerable to command injection.\n\nRemote unauthenticated attackers can gain arbitrary command execution with elevated privileges ( root ) on affected devices."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-88",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-88 OS Command Injection"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "ADJACENT",
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-77",
              "description": "CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-306",
              "description": "CWE-306 Missing Authentication for Critical Function",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-23T08:04:48.828Z",
        "orgId": "2d533b80-6e4a-4e20-93e2-171235122846",
        "shortName": "ONEKEY"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://www.onekey.com/resource/security-advisory-remote-command-execution-on-smartbedded-meteobridge-cve-2025-4008"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://forum.meteohub.de/viewtopic.php?t=18687"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "timeline": [
        {
          "lang": "en",
          "time": "2025-02-25T08:00:00.000Z",
          "value": "Notification email sent to  info@smartbedded.com"
        },
        {
          "lang": "en",
          "time": "2025-03-18T08:00:00.000Z",
          "value": "Notification email sent to  info@smartbedded.com"
        },
        {
          "lang": "en",
          "time": "2025-04-10T07:00:00.000Z",
          "value": "Notification email sent to  info@smartbedded.com"
        },
        {
          "lang": "en",
          "time": "2025-04-15T07:00:00.000Z",
          "value": "Notification email sent to  info@smartbedded.com"
        },
        {
          "lang": "en",
          "time": "2025-04-10T07:00:00.000Z",
          "value": "ONEKEY posts a message on MeteoBridge support forum"
        },
        {
          "lang": "en",
          "time": "2025-04-11T07:00:00.000Z",
          "value": "MeteoBridge support forum administrator delets the forum post and account."
        },
        {
          "lang": "en",
          "time": "2025-04-27T08:30:00.000Z",
          "value": "ONEKEY notifies the German BSI"
        },
        {
          "lang": "en",
          "time": "2025-05-14T07:00:00.000Z",
          "value": "Smartbedded notifies the German BSI of a patch being available (version 6.2)"
        },
        {
          "lang": "en",
          "time": "2025-05-21T15:30:00.000Z",
          "value": "CVE publication"
        }
      ],
      "title": "Arbitrary Command Injection in Smartbedded MeteoBridge",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "2d533b80-6e4a-4e20-93e2-171235122846",
    "assignerShortName": "ONEKEY",
    "cveId": "CVE-2025-4008",
    "datePublished": "2025-05-21T15:31:23.118Z",
    "dateReserved": "2025-04-27T08:21:52.184Z",
    "dateUpdated": "2025-10-21T22:55:14.636Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-4008 (GCVE-0-2025-4008)
Vulnerability from cvelistv5
Published
2025-05-21 15:31
Modified
2025-10-21 22:55
CWE
  • CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')
  • CWE-306 - Missing Authentication for Critical Function
Summary
The Meteobridge web interface let meteobridge administrator manage their weather station data collection and administer their meteobridge system through a web application written in CGI shell scripts and C. This web interface exposes an endpoint that is vulnerable to command injection. Remote unauthenticated attackers can gain arbitrary command execution with elevated privileges ( root ) on affected devices.
Impacted products
Vendor Product Version
Smartbedded MeteoBridge Version: 0    6.1
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-4008",
                "options": [
                  {
                    "Exploitation": "active"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-02T03:55:47.221471Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          },
          {
            "other": {
              "content": {
                "dateAdded": "2025-10-02",
                "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-4008"
              },
              "type": "kev"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-21T22:55:14.636Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "government-resource"
            ],
            "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-4008"
          }
        ],
        "timeline": [
          {
            "lang": "en",
            "time": "2025-10-02T00:00:00+00:00",
            "value": "CVE-2025-4008 added to CISA KEV"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "MeteoBridge",
          "vendor": "Smartbedded",
          "versions": [
            {
              "lessThanOrEqual": "6.1",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "ONEKEY Research Labs"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The Meteobridge web interface let meteobridge administrator manage their weather station data collection and administer their meteobridge system through a web application written in CGI shell scripts and C.\u003cbr\u003e\u003cbr\u003eThis web interface exposes an endpoint that is vulnerable to command injection.\u003cbr\u003e\u003cbr\u003eRemote unauthenticated attackers can gain arbitrary command execution with elevated privileges ( root ) on affected devices.\u003cbr\u003e"
            }
          ],
          "value": "The Meteobridge web interface let meteobridge administrator manage their weather station data collection and administer their meteobridge system through a web application written in CGI shell scripts and C.\n\nThis web interface exposes an endpoint that is vulnerable to command injection.\n\nRemote unauthenticated attackers can gain arbitrary command execution with elevated privileges ( root ) on affected devices."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-88",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-88 OS Command Injection"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "ADJACENT",
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-77",
              "description": "CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-306",
              "description": "CWE-306 Missing Authentication for Critical Function",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-23T08:04:48.828Z",
        "orgId": "2d533b80-6e4a-4e20-93e2-171235122846",
        "shortName": "ONEKEY"
      },
      "references": [
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://www.onekey.com/resource/security-advisory-remote-command-execution-on-smartbedded-meteobridge-cve-2025-4008"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://forum.meteohub.de/viewtopic.php?t=18687"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "timeline": [
        {
          "lang": "en",
          "time": "2025-02-25T08:00:00.000Z",
          "value": "Notification email sent to  info@smartbedded.com"
        },
        {
          "lang": "en",
          "time": "2025-03-18T08:00:00.000Z",
          "value": "Notification email sent to  info@smartbedded.com"
        },
        {
          "lang": "en",
          "time": "2025-04-10T07:00:00.000Z",
          "value": "Notification email sent to  info@smartbedded.com"
        },
        {
          "lang": "en",
          "time": "2025-04-15T07:00:00.000Z",
          "value": "Notification email sent to  info@smartbedded.com"
        },
        {
          "lang": "en",
          "time": "2025-04-10T07:00:00.000Z",
          "value": "ONEKEY posts a message on MeteoBridge support forum"
        },
        {
          "lang": "en",
          "time": "2025-04-11T07:00:00.000Z",
          "value": "MeteoBridge support forum administrator delets the forum post and account."
        },
        {
          "lang": "en",
          "time": "2025-04-27T08:30:00.000Z",
          "value": "ONEKEY notifies the German BSI"
        },
        {
          "lang": "en",
          "time": "2025-05-14T07:00:00.000Z",
          "value": "Smartbedded notifies the German BSI of a patch being available (version 6.2)"
        },
        {
          "lang": "en",
          "time": "2025-05-21T15:30:00.000Z",
          "value": "CVE publication"
        }
      ],
      "title": "Arbitrary Command Injection in Smartbedded MeteoBridge",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "2d533b80-6e4a-4e20-93e2-171235122846",
    "assignerShortName": "ONEKEY",
    "cveId": "CVE-2025-4008",
    "datePublished": "2025-05-21T15:31:23.118Z",
    "dateReserved": "2025-04-27T08:21:52.184Z",
    "dateUpdated": "2025-10-21T22:55:14.636Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}