RUGGEDCOM ROX JSONRPC input validation flaw allows root file read < V2.17.1
CVE-2025-40948 Published on May 12, 2026

A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.17.1), RUGGEDCOM ROX MX5000RE (All versions < V2.17.1), RUGGEDCOM ROX RX1400 (All versions < V2.17.1), RUGGEDCOM ROX RX1500 (All versions < V2.17.1), RUGGEDCOM ROX RX1501 (All versions < V2.17.1), RUGGEDCOM ROX RX1510 (All versions < V2.17.1), RUGGEDCOM ROX RX1511 (All versions < V2.17.1), RUGGEDCOM ROX RX1512 (All versions < V2.17.1), RUGGEDCOM ROX RX1524 (All versions < V2.17.1), RUGGEDCOM ROX RX1536 (All versions < V2.17.1), RUGGEDCOM ROX RX5000 (All versions < V2.17.1). Affected devices do not properly validate input in the web server's JSON-RPC interface. This could allow an authenticated remote attacker to read arbitrary files from the underlying operating system's filesystem with root privileges.

NVD

Weakness Type

What is an Argument Injection Vulnerability?

The software constructs a string for a command to executed by a separate component in another control sphere, but it does not properly delimit the intended arguments, options, or switches within that command string.

CVE-2025-40948 has been classified to as an Argument Injection vulnerability or weakness.


Affected Versions

Siemens RUGGEDCOM ROX MX5000: Siemens RUGGEDCOM ROX MX5000RE: Siemens RUGGEDCOM ROX RX1400: Siemens RUGGEDCOM ROX RX1500: Siemens RUGGEDCOM ROX RX1501: Siemens RUGGEDCOM ROX RX1510: Siemens RUGGEDCOM ROX RX1511: Siemens RUGGEDCOM ROX RX1512: Siemens RUGGEDCOM ROX RX1524: Siemens RUGGEDCOM ROX RX1536: Siemens RUGGEDCOM ROX RX5000:

Exploit Probability

EPSS
0.04%
Percentile
11.22%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.