Command injection vulnerability exists in the “Logging” page of the web-based configuration utility. An authenticated user with low privileged network access for the configuration utility can execute arbitrary commands on the underlying OS to obtain root SSH access to the TropOS 4th Gen device.
                
            Metrics
Affected Vendors & Products
References
        History
                    Wed, 29 Oct 2025 11:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Hitachienergy Hitachienergy tropos | |
| Vendors & Products | Hitachienergy Hitachienergy tropos | 
Tue, 28 Oct 2025 14:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Tue, 28 Oct 2025 12:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Command injection vulnerability exists in the “Logging” page of the web-based configuration utility. An authenticated user with low privileged network access for the configuration utility can execute arbitrary commands on the underlying OS to obtain root SSH access to the TropOS 4th Gen device. | |
| Weaknesses | CWE-78 | |
| References |  | |
| Metrics | cvssV4_0 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: Hitachi Energy
Published: 2025-10-28T12:15:29.573Z
Updated: 2025-10-28T13:14:18.210Z
Reserved: 2025-02-04T16:13:15.117Z
Link: CVE-2025-1036
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-10-28T13:14:13.595Z
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2025-10-28T13:15:56.080
Modified: 2025-10-30T15:05:32.197
Link: CVE-2025-1036
 Redhat
                        Redhat
                    No data.