CVE-2025-63207

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to change all user passwords (Admin, Operator, User) on R.V.R Elettronica TEX devices by sending a POST request to the /_Passwd.html endpoint. This results in complete system compromise and potential loss of control. Organizations using affected TEX products with vulnerable firmware are at risk.

💻 Affected Systems

Products:
  • R.V.R Elettronica TEX product
Versions: Firmware TEXL-000400, Web GUI TLAN-000400
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running the specified firmware versions are vulnerable by default. No special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover: attacker changes all passwords, locks out legitimate users, gains administrative control, and could disrupt industrial operations or use the device as an attack pivot point.

🟠

Likely Case

Unauthorized password changes leading to denial of service (legitimate users locked out) and potential configuration changes if attacker gains access.

🟢

If Mitigated

Limited impact if network segmentation prevents external access and strong authentication controls are in place elsewhere.

🌐 Internet-Facing: HIGH - Any internet-exposed device is trivially exploitable with a single HTTP request.
🏢 Internal Only: HIGH - Even internally, any network-accessible device can be exploited without authentication.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit requires only a single HTTP POST request with password parameters. Public GitHub repository contains proof-of-concept.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.rvr.it/en/

Restart Required: No

Instructions:

1. Check vendor website for security advisories. 2. If patch available, download from vendor portal. 3. Apply firmware update following vendor instructions. 4. Verify update was successful.

🔧 Temporary Workarounds

Network Access Control

all

Restrict network access to TEX devices to only authorized management networks

Web Interface Disable

all

Disable web GUI if not required for operations

🧯 If You Can't Patch

  • Isolate TEX devices in separate VLAN with strict firewall rules allowing only necessary traffic
  • Implement network monitoring for POST requests to /_Passwd.html endpoint

🔍 How to Verify

Check if Vulnerable:

Send POST request to http://[device-ip]/_Passwd.html with password parameters. If it changes passwords without authentication, device is vulnerable.

Check Version:

Check device web interface or console for firmware version TEXL-000400 and GUI version TLAN-000400

Verify Fix Applied:

Attempt the same POST request after remediation - should return authentication error or 403 Forbidden.

📡 Detection & Monitoring

Log Indicators:

  • HTTP POST requests to /_Passwd.html endpoint
  • Password change events without prior authentication

Network Indicators:

  • HTTP POST to /_Passwd.html from unauthorized IPs
  • Unusual password reset patterns

SIEM Query:

source="web_logs" AND url="/_Passwd.html" AND method="POST"

🔗 References

📤 Share & Export