CVE-2025-41733

The commissioning wizard on the affected devices does not validate if the device is already initialized. An unauthenticated remote attacker can construct POST requests to set root credentials.
References
Link Resource
https://certvde.com/de/advisories/VDE-2025-097 Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:metz-connect:ewio2-m_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:metz-connect:ewio2-m:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:metz-connect:ewio2-m-bm_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:metz-connect:ewio2-m-bm:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:metz-connect:ewio2-bm_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:metz-connect:ewio2-bm:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-11-18 11:15

Updated : 2025-11-21 19:14


NVD link : CVE-2025-41733

Mitre link : CVE-2025-41733

CVE.ORG link : CVE-2025-41733


JSON object : View

Products Affected

metz-connect

  • ewio2-m-bm_firmware
  • ewio2-m-bm
  • ewio2-m_firmware
  • ewio2-bm_firmware
  • ewio2-bm
  • ewio2-m
CWE
CWE-305

Authentication Bypass by Primary Weakness