CVE-2025-1036
28.10.2025, 13:15
Command injection vulnerability exists in the Logging page of the web-based configuration utility. An authenticated user with low privileged network access for the configuration utility can execute arbitrary commands on the underlying OS to obtain root SSH access to the TropOS 4th Gen device.
Awaiting analysis
This vulnerability is currently awaiting analysis.