Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-48466 PoC — Advantech多款产品 安全漏洞

Source
Associated Vulnerability
Title:Advantech多款产品 安全漏洞 (CVE-2025-48466)
Description:Advantech WISE-4060LAN是中国台湾研华(Advantech)公司的一个工业自动化控制器。 Advantech多款产品存在安全漏洞,该漏洞源于未经验证的远程攻击者可发送Modbus TCP数据包操纵数字输出,可能导致远程控制继电器通道。以下产品受到影响:WISE-4010LAN、WISE-4050LAN和WISE-4060LAN。
Description
Modbus Packet Injection on Advantech WISE 4060LAN / IoT Gateway for door control
Readme
# CVE-2025-48466
Modbus Packet Injection on Advantech WISE 4060LAN / IoT Gateway for door control. (see script: main.py)

# Summary
I was able to figure out that it is just very easy to somehow manipulate the Modbus server running on an IoT Gateway for door control on a network. Any remote attacker without even having access to the admin panel of WISE-4060/LAN can execute the script and cause disruption or toggling of the Digital Output (DO) of the WISE-4060/LAN 4-channel Digital Input / 4-channel Relay Output IoT Ethernet I/O Module.

This vulnerability was discovered during our stint at SPIRITCYBER-24 IoT / OT Hackathon at Singapore. 

# Impact

Consequences: Remote attackers can execute Modbus commands to WISE-4060/LAN module and manipulate the DO channels. This could lead to unauthorized control of connected devices, such as turning systems on or off, causing disruptions or unsafe conditions.

In industrial settings, the DO channels might control critical systems like power relays, alarms, or machinery. In this case it is for door control .Unauthorized manipulation could lead to dangerous conditions, safety hazards, or equipment damage.

An attacker might capture valid Modbus commands and replay them later, causing unintended actions like toggling DO channels at inappropriate times.

# main.py

Here is the output when running the script which fuzzes the addresses for the DO. Successful responses have 0x00 on the end while 0x02 is for fails.

<img width="446" alt="image" src="https://github.com/user-attachments/assets/025ec5ce-ec17-4bf6-825d-721e5324e569" />

# PoC Video
https://github.com/user-attachments/assets/b0dccbd9-7974-430b-af5e-2198daf735db





File Snapshot

[4.0K] /data/pocs/01649d9fa93c1f181bba383f1bd919b8bffd112d ├── [1.3K] main.py └── [1.6K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.