The Meteobridge web interface let meteobridge administrator manage their weather station data collection and administer their meteobridge system through a web application written in CGI shell scripts and C.
This web interface exposes an endpoint that is vulnerable to command injection.
Remote unauthenticated attackers can gain arbitrary command execution with elevated privileges ( root ) on affected devices.
References
| Link | Resource |
|---|---|
| https://forum.meteohub.de/viewtopic.php?t=18687 | Vendor Advisory |
| https://www.onekey.com/resource/security-advisory-remote-command-execution-on-smartbedded-meteobridge-cve-2025-4008 | Exploit Third Party Advisory |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-4008 | US Government Resource |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-05-21 16:15
Updated : 2025-10-27 17:02
NVD link : CVE-2025-4008
Mitre link : CVE-2025-4008
CVE.ORG link : CVE-2025-4008
JSON object : View
Products Affected
smartbedded
- meteobridge_firmware
- meteobridge_vm
