CVE-2025-40949: Critical RUGGEDCOM ROX Command Injection
The National Vulnerability Database has disclosed CVE-2025-40949, a critical command injection vulnerability affecting multiple Siemens RUGGEDCOM ROX devices. This flaw, rated 9.1 CVSS, resides in the Web UI’s Scheduler functionality, where user-supplied input is not properly sanitized.
This oversight allows an authenticated remote attacker to inject commands into the task scheduling backend. The critical impact here is arbitrary command execution with root privileges on the underlying operating system. This is a complete system compromise, enabling full control over the affected industrial network device.
Impacted products include RUGGEDCOM ROX MX5000, MX5000RE, RX1400, RX1500, RX1501, RX1510, RX1511, RX1512, RX1524, RX1536, and RX5000. All versions prior to V2.17.1 are vulnerable. Given these devices’ common deployment in critical infrastructure and industrial control systems, this vulnerability presents a severe operational technology (OT) risk.
What This Means For You
- If your organization deploys any Siemens RUGGEDCOM ROX devices listed, you must immediately verify their firmware versions. Any device running a version prior to V2.17.1 is critically vulnerable to CVE-2025-40949. Patching is not optional; it's a priority to prevent root-level compromise by an authenticated attacker. Audit logs for any suspicious scheduler activity or unauthorized command execution on these devices.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2025-40949: RUGGEDCOM ROX Scheduler Command Injection via Web UI
title: CVE-2025-40949: RUGGEDCOM ROX Scheduler Command Injection via Web UI
id: scw-2026-05-12-ai-1
status: experimental
level: critical
description: |
Detects attempts to exploit CVE-2025-40949 by targeting the scheduler functionality in the RUGGEDCOM ROX Web UI. The rule looks for specific URI paths and query parameters commonly used in command injection attacks against this vulnerability, aiming to identify the execution of arbitrary commands.
author: SCW Feed Engine (AI-generated)
date: 2026-05-12
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2025-40949/
tags:
- attack.execution
- attack.t1059.004
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/cgi-bin/webif/scheduler.sh'
cs-uri-query|contains:
- 'cmd='
- 'task='
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2025-40949 | Command Injection | RUGGEDCOM ROX MX5000 (All versions < V2.17.1) |
| CVE-2025-40949 | Command Injection | RUGGEDCOM ROX MX5000RE (All versions < V2.17.1) |
| CVE-2025-40949 | Command Injection | RUGGEDCOM ROX RX1400 (All versions < V2.17.1) |
| CVE-2025-40949 | Command Injection | RUGGEDCOM ROX RX1500 (All versions < V2.17.1) |
| CVE-2025-40949 | Command Injection | Vulnerable component: Scheduler functionality in Web UI |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 12, 2026 at 13:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.