CVE-2025-69983

CRITICAL
9.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

2
Analysis Generated
Mar 12, 2026 - 21:54 vuln.today
CVE Published
Feb 03, 2026 - 18:16 nvd
CRITICAL 9.8

Description

FUXA v1.2.7 allows Remote Code Execution (RCE) via the project import functionality. The application does not properly sanitize or sandbox user-supplied scripts within imported project files. An attacker can upload a malicious project containing system commands, leading to full system compromise.

Analysis

FUXA v1.2.7 allows remote code execution through the project import functionality by importing crafted project files containing malicious code.

Technical Context

FUXA v1.2.7 does not sanitize project import data (CWE-94), allowing attackers to inject code through crafted project files that executes during import, the fourth critical vulnerability in the FUXA SCADA platform.

Affected Products

['FUXA v1.2.7']

Remediation

Update FUXA urgently. Address all four vulnerabilities. Never expose SCADA/HMI systems to the internet.

Priority Score

49
Low Medium High Critical
KEV: 0
EPSS: +0.3
CVSS: +49
POC: 0

Share

CVE-2025-69983 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy