Loading
Generated remediation guidance and an executive summary. No account required.
A low‑privileged local attacker who gains access to the UBR service account (e.g., via SSH) can escalate privileges to obtain full system access. This is due to the service account being permitted to execute certain binaries (e.g., tcpdump and ip) with sudo.
Use CWE-88, Mbs-Solutions vendor hub and Universal Bacnet Router Firmware product page to widen CVE-2025-41761 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2025-41765, CVE-2025-41764 and CVE-2025-41766 for nearby disclosures in the same product family.