CVE-2025-4008: Arbitrary Command Injection in Smartbedded MeteoBridge

9.4 CVSS

Description

The Meteobridge web interface let meteobridge administrator manage their weather station data collection and administer their meteobridge system through a web application written in CGI shell scripts and C.

This web interface exposes an endpoint that is vulnerable to command injection.

Remote unauthenticated attackers can gain arbitrary command execution with elevated privileges ( root ) on affected devices.

Classification

CVE ID: CVE-2025-4008

CVSS Base Severity: CRITICAL

CVSS Base Score: 9.4

CVSS Vector: CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Problem Types

CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') CWE-306 Missing Authentication for Critical Function

Affected Products

Vendor: Smartbedded

Product: MeteoBridge

Nuclei Template

http/cves/2025/CVE-2025-4008.yaml

Exploit Prediction Scoring System (EPSS)

EPSS Score: 2.88% (probability of being exploited)

EPSS Percentile: 85.63% (scored less or equal to compared to others)

EPSS Date: 2025-06-06 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-4008
https://www.onekey.com/resource/security-advisory-remote-command-execution-on-smartbedded-meteobridge-cve-2025-4008
https://forum.meteohub.de/viewtopic.php?t=18687

Timeline