A high-privileged remote attacker can fully compromise the device by abusing an update signature bypass vulnerability in the wwwupdate.cgi method in the web interface of UBR.
References
History

Tue, 10 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Mbs
Mbs ubr-01 Mk Ii
Mbs ubr-02
Mbs ubr-lon
Vendors & Products Mbs
Mbs ubr-01 Mk Ii
Mbs ubr-02
Mbs ubr-lon

Mon, 09 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 08:30:00 +0000

Type Values Removed Values Added
Description A high-privileged remote attacker can fully compromise the device by abusing an update signature bypass vulnerability in the wwwupdate.cgi method in the web interface of UBR.
Title Signature bypass on update upload
Weaknesses CWE-347
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published: 2026-03-09T08:18:17.428Z

Updated: 2026-03-09T18:19:09.365Z

Reserved: 2025-04-16T11:18:45.761Z

Link: CVE-2025-41767

cve-icon Vulnrichment

Updated: 2026-03-09T18:19:04.395Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-09T09:16:01.357

Modified: 2026-03-09T13:35:07.393

Link: CVE-2025-41767

cve-icon Redhat

No data.