Advisory

Multiple vulnerabilities reported in Weidmueller Industrial Routers

Take action: If you have Weidmueller IE-SR-2TX industrial routers, make sure they are isolated from the internet and accesible from trusted networks only. Then plan an update to the latest firmware versions (V1.49 or V1.62 depending on your model).


Learn More

Weidmueller Interface GmbH & Co. KG is reporting multiple critical security vulnerabilities affecting its IE-SR-2TX series of industrial security routers that could allow attackers to execute arbitrary commands with root privileges on compromised devices. 

Vulnerabilities summary:

  • CVE-2025-41663 (CVSS score 9.8) - OS Command Injection vulnerability affecting the u-link Management API, allowing unauthenticated remote attackers in man-in-the-middle positions to inject arbitrary commands in responses from WWH servers
  • CVE-2025-41687 (CVSS score 9.8) - Stack-based Buffer Overflow in the u-link Management API that enables unauthenticated remote attackers to gain full access to affected devices
  • CVE-2025-41661 (CVSS score 8.8) - Cross-Site Request Forgery vulnerability allowing unauthenticated remote attackers to execute arbitrary commands with root privileges due to lack of CSRF protection
  • CVE-2025-41683 (CVSS score 8.8) - OS Command Injection in the Main Web Interface event_mail_test endpoint enabling authenticated attackers to execute arbitrary commands with root privileges
  • CVE-2025-41684 (CVSS score 8.8) - OS Command Injection in the Main Web Interface tls_iotgen_setting endpoint allowing authenticated attackers to execute arbitrary commands with root privileges

The security flaws impact multiple models of Weidmueller's IE-SR-2TX wireless security routers.

ProductAffected VersionFixed Version
IE-SR-2TX-WL
 
<V1.49
 
V1.49
IE-SR-2TX-WL-4G-EU
 
<V1.62V1.62
IE-SR-2TX-WL-4G-US-V
 
<V1.62V1.62

Apart from applying the firmware updates, Weidmueller  recommends that organizations change all default passwords on affected devices, isolate the routers within protected network segments, and restrict access to trusted networks.

Multiple vulnerabilities reported in Weidmueller Industrial Routers