RUGGEDCOM ROX JSONRPC input validation flaw allows root file read < V2.17.1
CVE-2025-40948 Published on May 12, 2026
A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.17.1), RUGGEDCOM ROX MX5000RE (All versions < V2.17.1), RUGGEDCOM ROX RX1400 (All versions < V2.17.1), RUGGEDCOM ROX RX1500 (All versions < V2.17.1), RUGGEDCOM ROX RX1501 (All versions < V2.17.1), RUGGEDCOM ROX RX1510 (All versions < V2.17.1), RUGGEDCOM ROX RX1511 (All versions < V2.17.1), RUGGEDCOM ROX RX1512 (All versions < V2.17.1), RUGGEDCOM ROX RX1524 (All versions < V2.17.1), RUGGEDCOM ROX RX1536 (All versions < V2.17.1), RUGGEDCOM ROX RX5000 (All versions < V2.17.1). Affected devices do not properly validate input in the web server's JSON-RPC interface. This could allow an authenticated remote attacker to read arbitrary files from the underlying operating system's filesystem with root privileges.
Weakness Type
What is an Argument Injection Vulnerability?
The software constructs a string for a command to executed by a separate component in another control sphere, but it does not properly delimit the intended arguments, options, or switches within that command string.
CVE-2025-40948 has been classified to as an Argument Injection vulnerability or weakness.
Affected Versions
Siemens RUGGEDCOM ROX MX5000:- Before V2.17.1 is affected.
- Before V2.17.1 is affected.
- Before V2.17.1 is affected.
- Before V2.17.1 is affected.
- Before V2.17.1 is affected.
- Before V2.17.1 is affected.
- Before V2.17.1 is affected.
- Before V2.17.1 is affected.
- Before V2.17.1 is affected.
- Before V2.17.1 is affected.
- Before V2.17.1 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.