This security advisory addresses two vulnerabilities identified in Secure Router.
CVE-2026-3867
An improper ownership management vulnerability has been identified in Moxa’s Secure Router. Because of improper ownership management, a low-privileged authenticated user may access a configuration file containing the hashed password of the administrative account. Successful exploitation of this vulnerability could allow an attacker to obtain sensitive information. Exploitation is only possible under a specific condition — when the configuration file has been exported. This vulnerability does not impact the integrity or availability of the affected product, and no confidentiality, integrity, or availability impact to the subsequent system has been identified.
CVE-2026-3868
An improper handling of the length parameter inconsistency vulnerability has been identified in Moxa’s Secure Router. Because of improper validation of length parameters in the HTTPS management interface, an unauthenticated remote attacker could send specially crafted requests that trigger a buffer overflow condition, causing the web service to become unresponsive. Successful exploitation may result in a denial-of-service condition requiring a device reboot to restore normal operation. While successful exploitation can severely impact the availability of the affected device, no impact to the confidentiality or integrity of the affected product has been identified. Additionally, no confidentiality, integrity, or availability impact to the subsequent system has been identified.
Given the high severity of CVE-2026-3868, users should apply the solutions immediately to reduce security risks.
The Identified Vulnerability Type and Potential Impact
| CVE ID |
Vulnerability Type |
Impact |
| CVE-2026-3867 |
CWE-282: Improper Ownership Management
|
CAPEC-122: Privilege Abuse |
| CVE-2026-3868 |
CWE-130: Improper Handling of Length Parameter Inconsistency |
CAPEC-47: Buffer Overflow via Parameter Expansion |
Vulnerability Scoring Details
|
CVE ID
|
Base Score
|
Vector
|
Severity |
Unauthenticated
Remote Exploits
|
| CVE-2026-3867 |
CVSS 4.0: 6.0
|
AV:N/AC:L/AT:P/PR:L/UI:N/
VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
|
Medium |
No |
| CVE-2026-3868 |
CVSS 4.0: 8.7 |
AV:N/AC:L/AT:N/PR:N/UI:N/
VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
|
High |
Yes |