Cmd Inject via Scheduler in RuggedCom ROX <V2.17.1
CVE-2025-40949 Published on May 12, 2026

A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.17.1), RUGGEDCOM ROX MX5000RE (All versions < V2.17.1), RUGGEDCOM ROX RX1400 (All versions < V2.17.1), RUGGEDCOM ROX RX1500 (All versions < V2.17.1), RUGGEDCOM ROX RX1501 (All versions < V2.17.1), RUGGEDCOM ROX RX1510 (All versions < V2.17.1), RUGGEDCOM ROX RX1511 (All versions < V2.17.1), RUGGEDCOM ROX RX1512 (All versions < V2.17.1), RUGGEDCOM ROX RX1524 (All versions < V2.17.1), RUGGEDCOM ROX RX1536 (All versions < V2.17.1), RUGGEDCOM ROX RX5000 (All versions < V2.17.1). Affected devices do not properly sanitize user-supplied input in the Scheduler functionality of the Web UI, allowing commands to be injected into the task scheduling backend. This could allow an authenticated remote attacker to execute arbitrary commands with root privileges on the underlying operating system.

NVD

Weakness Type

What is a Shell injection Vulnerability?

The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.

CVE-2025-40949 has been classified to as a Shell injection vulnerability or weakness.


Affected Versions

Siemens RUGGEDCOM ROX MX5000: Siemens RUGGEDCOM ROX MX5000RE: Siemens RUGGEDCOM ROX RX1400: Siemens RUGGEDCOM ROX RX1500: Siemens RUGGEDCOM ROX RX1501: Siemens RUGGEDCOM ROX RX1510: Siemens RUGGEDCOM ROX RX1511: Siemens RUGGEDCOM ROX RX1512: Siemens RUGGEDCOM ROX RX1524: Siemens RUGGEDCOM ROX RX1536: Siemens RUGGEDCOM ROX RX5000:

Exploit Probability

EPSS
0.17%
Percentile
38.28%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.