Description

The web management interface in ETL Systems Ltd DEXTRA Series ' Digital L-Band Distribution System v1.8 does not implement Cross-Site Request Forgery (CSRF) protection mechanisms (no tokens, no Origin/Referer validation) on critical configuration endpoints.

INFO

Published Date :

2025-12-26T00:00:00.000Z

Last Modified :

2025-12-26T16:29:15.819Z

Source :

mitre
AFFECTED PRODUCTS

The following products are affected by CVE-2025-67013 vulnerability.

Vendors Products
Etlsystems
  • C0401d1uia-22476
  • C0401d1uia-22476 Firmware
  • C0401d1ula-22419
  • C0401d1ula-22419 Firmware
  • C0401d1ula-22456
  • C0401d1ula-22456 Firmware
  • C0401s1ula-22418
  • C0401s1ula-22418 Firmware
  • C0401s1ula-22455
  • C0401s1ula-22455 Firmware
  • C0801d1ula-22421
  • C0801d1ula-22421 Firmware
  • C0801d1ula-22458
  • C0801d1ula-22458 Firmware
  • C0801s1ula-22420
  • C0801s1ula-22420 Firmware
  • C0801s1ula-22457
  • C0801s1ula-22457 Firmware
  • C1601s1uia-22479
  • C1601s1uia-22479 Firmware
  • C1601s1ula-22422
  • C1601s1ula-22422 Firmware
  • C1601s1ula-22459
  • C1601s1ula-22459 Firmware
  • D0104d1ula-22411
  • D0104d1ula-22411 Firmware
  • D0104d1ula-22451
  • D0104d1ula-22451 Firmware
  • D0104s1ula-22410
  • D0104s1ula-22410 Firmware
  • D0104s1ula-22450
  • D0104s1ula-22450 Firmware
  • D0108d1uia-22473
  • D0108d1uia-22473 Firmware
  • D0108d1ula-22413
  • D0108d1ula-22413 Firmware
  • D0108d1ula-22453
  • D0108d1ula-22453 Firmware
  • D0108s1ula-22412
  • D0108s1ula-22412 Firmware
  • D0108s1ula-22452
  • D0108s1ula-22452 Firmware
  • D0116s1uia-22474
  • D0116s1uia-22474 Firmware
  • D0116s1ula-22414
  • D0116s1ula-22414 Firmware
  • D0116s1ula-22454
  • D0116s1ula-22454 Firmware
  • H0104d1ula-22460
  • H0104d1ula-22460 Firmware
  • H0108d1ula-22431
  • H0108d1ula-22431 Firmware
  • H0108d1ula-22461
  • H0108d1ula-22461 Firmware
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-67013.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact