3onedata modbus gateway device model GW1101-1D(RS-485)-TB-P (hardware version V2.2.0) allows authenticated users to execute arbitrary shell commands in the context of the root user by providing payload in the "IP address" field of the diagnosis test tools.
This issue has been resolved in firmware version 3.0.59B2024080600R4353
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://cert.pl/en/posts/2026/05/CVE-2025-13605 |
|
History
Mon, 04 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
3onedata
3onedata gw1101-1d(rs-485)-tb-p |
|
| Vendors & Products |
3onedata
3onedata gw1101-1d(rs-485)-tb-p |
Mon, 04 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 04 May 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | 3onedata modbus gateway device model GW1101-1D(RS-485)-TB-P (hardware version V2.2.0) allows authenticated users to execute arbitrary shell commands in the context of the root user by providing payload in the "IP address" field of the diagnosis test tools. This issue has been resolved in firmware version 3.0.59B2024080600R4353 | |
| Title | Shell command injection in 3onedata GW1101-1D(RS-485)-TB-P modbus gateway | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2026-05-04T15:28:56.851Z
Reserved: 2025-11-24T14:44:56.542Z
Link: CVE-2025-13605
Updated: 2026-05-04T15:28:44.757Z
Status : Received
Published: 2026-05-04T15:16:02.630
Modified: 2026-05-04T15:16:02.630
Link: CVE-2025-13605
No data.