Successful exploitation of the vulnerability could allow an unauthenticated, remote attacker to send Modbus TCP packets to manipulate Digital Outputs, potentially allowing remote control of relay channel which may lead to operational or safety risks.
CVSS
No CVSS.
References
| Link | Resource |
|---|---|
| https://github.com/shipcod3/CVE-2025-48466 | Exploit Third Party Advisory |
| https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061 | Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
History
09 Jul 2025, 17:18
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:advantech:wise-4010lan_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:advantech:wise-4010lan:-:*:*:*:*:*:*:* cpe:2.3:o:advantech:wise-4050lan_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:advantech:wise-4050lan:-:*:*:*:*:*:*:* |
|
| First Time |
Advantech wise-4010lan Firmware
Advantech wise-4050lan Firmware Advantech wise-4050lan Advantech wise-4010lan |
09 Jul 2025, 15:04
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:h:advantech:wise-4060lan:-:*:*:*:*:*:*:* cpe:2.3:o:advantech:wise-4060lan_firmware:2.02b00:*:*:*:*:*:*:* |
|
| References | () https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061 - Third Party Advisory | |
| References | () https://github.com/shipcod3/CVE-2025-48466 - Exploit, Third Party Advisory | |
| First Time |
Advantech
Advantech wise-4060lan Firmware Advantech wise-4060lan |
24 Jun 2025, 03:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-06-24 03:15
Updated : 2025-07-09 17:18
NVD link : CVE-2025-48466
Mitre link : CVE-2025-48466
JSON object : View
Products Affected
advantech
- wise-4060lan_firmware
- wise-4050lan_firmware
- wise-4050lan
- wise-4060lan
- wise-4010lan_firmware
- wise-4010lan
CWE
No CWE.
