U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2025-34035

Change History

Initial Analysis by NIST 7/09/2025 3:08:56 PM

Action Type Old Value New Value
Added CVSS V3.1

								
							
							
						
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Added CWE

								
							
							
						
CWE-78
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:engeniustech:epg5000_firmware:1.2.0:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:epg5000_firmware:1.3.0:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:epg5000_firmware:1.3.2:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:epg5000_firmware:1.3.3:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:epg5000_firmware:1.3.3.17:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:epg5000_firmware:1.3.7.20:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:epg5000_firmware:1.3.9.21:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:engeniustech:epg5000:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:engeniustech:esr1200_firmware:1.1.0:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:esr1200_firmware:1.3.1.34:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:esr1200_firmware:1.4.1:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:esr1200_firmware:1.4.3:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:esr1200_firmware:1.4.5:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:engeniustech:esr1200:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:engeniustech:esr1750_firmware:1.1.0:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:esr1750_firmware:1.2.2.27:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:esr1750_firmware:1.3.0:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:esr1750_firmware:1.3.1.34:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:esr1750_firmware:1.4.0:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:esr1750_firmware:1.4.1:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:esr1750_firmware:1.4.5:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:esr1750_firmware:1.4.3:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:engeniustech:esr1750:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:engeniustech:esr300_firmware:1.1.0.28:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:esr300_firmware:1.3.1.42:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:esr300_firmware:1.4.0:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:esr300_firmware:1.4.1.28:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:esr300_firmware:1.4.2:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:esr300_firmware:1.4.7:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:esr300_firmware:1.4.9:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:engeniustech:esr300:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:engeniustech:esr350_firmware:1.1.0.29:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:esr350_firmware:1.3.1.41:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:esr350_firmware:1.4.0:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:esr350_firmware:1.4.11:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:esr350_firmware:1.4.2:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:esr350_firmware:1.4.5:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:esr350_firmware:1.4.9:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:engeniustech:esr350:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:engeniustech:esr600_firmware:1.1.0.50:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:esr600_firmware:1.2.1.46:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:esr600_firmware:1.3.1.63:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:esr600_firmware:1.4.0.23:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:esr600_firmware:1.4.1:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:esr600_firmware:1.4.11:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:esr600_firmware:1.4.9:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:esr600_firmware:1.4.5:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:esr600_firmware:1.4.3:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:esr600_firmware:1.4.2:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:engeniustech:esr600:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:engeniustech:esr900_firmware:1.1.0:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:esr900_firmware:1.2.2.23:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:esr900_firmware:1.3.0:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:esr900_firmware:1.3.1.26:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:esr900_firmware:1.3.5.18:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:esr900_firmware:1.4.0:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:esr900_firmware:1.4.5:*:*:*:*:*:*:*
          *cpe:2.3:o:engeniustech:esr900_firmware:1.4.3:*:*:*:*:*:*:*
     OR
          cpe:2.3:h:engeniustech:esr900:-:*:*:*:*:*:*:*
Added Reference Type

								
							
							
						
CISA-ADP: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5413.php Types: Exploit, Third Party Advisory
Added Reference Type

								
							
							
						
VulnCheck: https://cxsecurity.com/issue/WLB-2017060050 Types: Exploit, Third Party Advisory
Added Reference Type

								
							
							
						
VulnCheck: https://packetstormsecurity.com/files/142792 Types: Broken Link
Added Reference Type

								
							
							
						
VulnCheck: https://vulncheck.com/advisories/engenius-enshare-iot-gigabit-cloud-service Types: Third Party Advisory
Added Reference Type

								
							
							
						
VulnCheck: https://www.exploit-db.com/exploits/42114 Types: Exploit, Third Party Advisory
Added Reference Type

								
							
							
						
VulnCheck: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2017-5413.php Types: Exploit, Third Party Advisory