CVE-2025-4008
HIGHCVSS Vector
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Lifecycle Timeline
4Description
The Meteobridge web interface let meteobridge administrator manage their weather station data collection and administer their meteobridge system through a web application written in CGI shell scripts and C. This web interface exposes an endpoint that is vulnerable to command injection. Remote unauthenticated attackers can gain arbitrary command execution with elevated privileges ( root ) on affected devices.
Analysis
Meteobridge weather station web interface contains a command injection vulnerability allowing unauthenticated remote attackers to execute arbitrary commands through crafted requests to CGI endpoints.
Technical Context
The CWE-77 command injection in CGI shell scripts passes user input directly to shell commands without sanitization, enabling arbitrary command execution.
Affected Products
['Meteobridge (affected versions)']
Remediation
Apply firmware updates. Never expose IoT management interfaces to the internet. Isolate weather station equipment on separate network segments.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today