CVE-2025-52694
Execution of arbitrary SQL commands
Description
Successful exploitation of the SQL injection vulnerability could allow an unauthenticated remote attacker to execute arbitrary SQL commands on the vulnerable service when it is exposed to the Internet, potentially affecting data confidentiality, integrity, and availability. Users and administrators of affected product versions are advised to update to the latest versions immediately.
INFO
Published Date :
Jan. 12, 2026, 3:16 a.m.
Last Modified :
Jan. 26, 2026, 3:15 a.m.
Remotely Exploit :
Yes !
Source :
5f57b9bf-260d-4433-bf07-b6a79e9bb7d4
Affected Products
The following products are affected by CVE-2025-52694
vulnerability.
Even if cvefeed.io is aware of the exact versions of the
products
that
are
affected, the information is not represented in the table below.
CVSS Scores
| Score | Version | Severity | Vector | Exploitability Score | Impact Score | Source |
|---|---|---|---|---|---|---|
| CVSS 3.1 | CRITICAL | 5f57b9bf-260d-4433-bf07-b6a79e9bb7d4 | ||||
| CVSS 3.1 | CRITICAL | [email protected] |
Solution
- Update the affected software to the latest version.
- Apply vendor-supplied security patches immediately.
- Sanitize all user inputs before database queries.
- Use parameterized queries or prepared statements.
Public PoC/Exploit Available at Github
CVE-2025-52694 has a 1 public
PoC/Exploit available at Github.
Go to the Public Exploits tab to see the list.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2025-52694.
| URL | Resource |
|---|---|
| https://www.csa.gov.sg/alerts-and-advisories/alerts/alerts-al-2026-001/ | Mitigation Third Party Advisory |
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2025-52694 is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2025-52694
weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
CVE-2025-52694 Critical SQL Injection in Advantech IoTSuite/SaaS-Composer
Python
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2025-52694 vulnerability anywhere in the article.
-
Daily CyberSecurity
Hard-Coded Keys and Open Doors: Critical Flaws Found in PrismX AP Controllers
A trio of security vulnerabilities has been discovered in Browan Communications’ PrismX MX100 AP Controller, the most severe of which essentially leaves the digital keys under the doormat. In a new vu ... Read more
-
Daily CyberSecurity
Double Critical: Hardcoded Secrets Expose Ruckus IoT Controllers to Root RCE
A pair of critical security vulnerabilities has been disclosed in the Ruckus vRIoT IoT Controller, the central brain for managing enterprise IoT devices. Both flaws carry the maximum possible CVSS sco ... Read more
-
Daily CyberSecurity
CVE-2025-52694 (CVSS 10): Critical Advantech SQL Injection Exposes IoT Devices
The Cyber Security Agency of Singapore (CSA) has issued a high-priority alert regarding a devastating vulnerability in Advantech’s IoT product line. The flaw, tracked as CVE-2025-52694, carries the ma ... Read more
-
Daily CyberSecurity
Critical Alert: Moxa Switches Exposed to OpenSSH Remote Code Execution (CVSS 9.8)
A critical security vulnerability has been identified in Moxa’s industrial ethernet switches, threatening the integrity of operational technology (OT) networks. The vulnerability, tracked as CVE-2023- ... Read more
The following table lists the changes that have been made to the
CVE-2025-52694 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
CVE Modified by 5f57b9bf-260d-4433-bf07-b6a79e9bb7d4
Jan. 26, 2026
Action Type Old Value New Value Changed Description Successful exploitation of the SQL injection vulnerability could allow an unauthenticated remote attacker to execute arbitrary SQL commands on the vulnerable service when it is exposed to the Internet. Successful exploitation of the SQL injection vulnerability could allow an unauthenticated remote attacker to execute arbitrary SQL commands on the vulnerable service when it is exposed to the Internet, potentially affecting data confidentiality, integrity, and availability. Users and administrators of affected product versions are advised to update to the latest versions immediately. -
Initial Analysis by [email protected]
Jan. 22, 2026
Action Type Old Value New Value Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Added CPE Configuration OR *cpe:2.3:a:advantech:iot_edge_linux_docker:*:*:*:*:*:*:*:* versions up to (excluding) 2.0.2 *cpe:2.3:a:advantech:iot_edge_windows:*:*:*:*:*:*:*:* versions up to (excluding) 2.0.2 *cpe:2.3:a:advantech:iotsuite_growth_linux_docker:*:*:*:*:*:*:*:* versions up to (excluding) 2.0.2 *cpe:2.3:a:advantech:iotsuite_saas_composer:*:*:*:*:*:*:*:* versions up to (excluding) 3.4.15 *cpe:2.3:a:advantech:iotsuite_starter_linux_docker:*:*:*:*:*:*:*:* versions up to (excluding) 2.0.2 Added Reference Type CSA: https://www.csa.gov.sg/alerts-and-advisories/alerts/alerts-al-2026-001/ Types: Mitigation, Third Party Advisory -
CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0
Jan. 12, 2026
Action Type Old Value New Value Added CWE CWE-89 -
CVE Modified by 5f57b9bf-260d-4433-bf07-b6a79e9bb7d4
Jan. 12, 2026
Action Type Old Value New Value Added Reference https://www.csa.gov.sg/alerts-and-advisories/alerts/alerts-al-2026-001/ Removed Reference https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-127/ -
New CVE Received by 5f57b9bf-260d-4433-bf07-b6a79e9bb7d4
Jan. 12, 2026
Action Type Old Value New Value Added Description Successful exploitation of the SQL injection vulnerability could allow an unauthenticated remote attacker to execute arbitrary SQL commands on the vulnerable service when it is exposed to the Internet. Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Added Reference https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-127/