2025-06-24
5f57b9bf-260d-4433-bf07-b6a79e9bb7d4
8.1
CVSS 3.1
Share
CVSS Vector
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
High
Lifecycle Timeline
4
Analysis Generated
Mar 15, 2026 - 22:36 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 22:36 euvd
EUVD-2025-18993
PoC Detected
Jul 09, 2025 - 17:18 vuln.today
Public exploit code
CVE Published
Jun 24, 2025 - 03:15 nvd
HIGH 8.1
Tags
Description
Successful exploitation of the vulnerability could allow an unauthenticated, remote attacker to send Modbus TCP packets to manipulate Digital Outputs, potentially allowing remote control of relay channel which may lead to operational or safety risks.
Analysis
CVE-2025-48466 is a security vulnerability (CVSS 8.1). Risk factors: public PoC available.
Technical Context
CWE-863 (Incorrect Authorization). CVSS 8.1 indicates high severity.
Affected Products
['Unspecified product']
Remediation
Monitor vendor channels for patch availability.
Priority Score
61
Low
Medium
High
Critical
KEV: 0
EPSS: +0.1
CVSS: +40
POC: +20
Share
External POC / Exploit Code
Leaving vuln.today
Destination URL
POC code from unknown sources may be malicious, contain backdoors, or be fake.
Always review and test exploit code in a safe, isolated environment (VM/sandbox).
Verify the source reputation and cross-reference with known databases (Exploit-DB, GitHub Security).
EUVD-2025-18993