UG65 Gateway Vulnerability: An Admin’s Guide to Unintended Superpowers!
View CSAF: The latest UG65-868M-EA vulnerability is like leaving your front door open with a “Welcome” mat for hackers! With firmware versions before 60.0.0.46, admin users can wreak havoc by injecting shell commands. Fear not—Milesight has released a fix. Time to patch up and slam that digital door shut!

Hot Take:
Oh, the joys of firmware vulnerabilities! The UG65-868M-EA, a gateway for industrial mischief and mayhem, has opened its doors to unauthorized write access, giving admin users the power to inject shell commands like they’re performing a magic trick. Just when you thought your energy infrastructure was safe, Milesight’s firmware decided to throw a surprise party, and everyone’s invited—especially if you’re an admin with a penchant for command-line antics!
Key Points:
- Milesight UG65-868M-EA’s firmware is vulnerable to remote exploitation with low attack complexity.
- Vulnerability allows admin users to inject arbitrary shell commands by writing to the /etc/rc.local file.
- CVE-2025-4043 has been assigned with a CVSS v4 base score of 6.1.
- Milesight released firmware Version 60.0.0.46 to address the vulnerability.
- CISA recommends a suite of defensive measures, including VPN use and network isolation.