An administrator may attempt to block all networks by specifying "\*" or "all" as the network identifier. However, these values are not supported and do not trigger any validation error. Instead, they are silently interpreted as network 0 which results in no networks being blocked at all.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
History

Wed, 11 Mar 2026 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Mbs-solutions
Mbs-solutions ubr-01 Mk Ii
Mbs-solutions ubr-02
Mbs-solutions ubr-lon
Mbs-solutions universal Bacnet Router Firmware
CPEs cpe:2.3:h:mbs-solutions:ubr-01_mk_ii:-:*:*:*:*:*:*:*
cpe:2.3:h:mbs-solutions:ubr-02:-:*:*:*:*:*:*:*
cpe:2.3:h:mbs-solutions:ubr-lon:-:*:*:*:*:*:*:*
cpe:2.3:o:mbs-solutions:universal_bacnet_router_firmware:*:*:*:*:*:*:*:*
Vendors & Products Mbs-solutions
Mbs-solutions ubr-01 Mk Ii
Mbs-solutions ubr-02
Mbs-solutions ubr-lon
Mbs-solutions universal Bacnet Router Firmware

Tue, 10 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Mbs
Mbs ubr-01 Mk Ii
Mbs ubr-02
Mbs ubr-lon
Vendors & Products Mbs
Mbs ubr-01 Mk Ii
Mbs ubr-02
Mbs ubr-lon

Mon, 09 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 08:30:00 +0000

Type Values Removed Values Added
Description An administrator may attempt to block all networks by specifying "\*" or "all" as the network identifier. However, these values are not supported and do not trigger any validation error. Instead, they are silently interpreted as network 0 which results in no networks being blocked at all.
Title Use of wildcard (“*” or “all”) in Block list
Weaknesses CWE-636
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2026-03-09T20:14:05.817Z

Reserved: 2025-04-16T11:18:45.760Z

Link: CVE-2025-41759

cve-icon Vulnrichment

Updated: 2026-03-09T20:04:21.244Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-09T09:15:59.893

Modified: 2026-03-11T18:26:52.900

Link: CVE-2025-41759

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-10T14:10:07Z

Weaknesses