HomeIntelligenceBrief
VULNERABILITY BRIEF🔴 Critical Vulnerability

Authentication Bypass and Remote Code Execution in FUXA SCADA Platform (CVE‑2025‑69985) Exposes Critical Control Systems

A verified exploit (EDB‑52544) bypasses authentication in FUXA ≤ 1.2.8, granting attackers remote command execution on SCADA/HMI servers. The flaw affects energy and manufacturing operators that rely on the platform, demanding immediate patching and network segmentation.

LiveThreat™ Intelligence · 📅 April 30, 2026· 📰 exploit-db.com
🔴
Severity
Critical
VU
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
4 recommended
📰
Source
exploit-db.com

Authentication Bypass and Remote Code Execution in FUXA SCADA Platform (CVE‑2025‑69985) Exposes Critical Control Systems

What Happened – A publicly‑available exploit (EDB‑52544) demonstrates that FUXA ≤ 1.2.8 allows unauthenticated access to the /api/runscript endpoint, enabling arbitrary command execution on the host. The flaw (CVE‑2025‑69985) is an authentication bypass that directly leads to remote code execution (RCE).

Why It Matters for TPRM

  • The vulnerability targets web‑based SCADA/HMI software commonly deployed in energy and manufacturing environments, raising the risk of operational disruption.
  • Exploitation requires only network‑level access; no valid credentials are needed, making it attractive to opportunistic attackers.
  • The exploit is fully functional and publicly released, accelerating the window of exposure for any third‑party that supplies or consumes FUXA‑based services.

Who Is Affected – Energy & utilities operators, manufacturing plants, and any organization that integrates FUXA (or downstream services built on its API) into their control‑system stack.

Recommended Actions

  • Verify whether any third‑party vendors or internal teams run FUXA ≤ 1.2.8; if so, upgrade immediately to > 1.2.8.
  • Conduct a focused network scan for exposed /api/runscript endpoints and block them at the perimeter.
  • Review incident‑response playbooks for SCADA‑related RCE scenarios and ensure logs from the affected service are retained.

Technical Notes – The exploit sends a crafted JavaScript payload that invokes Node.js child_process.execSync to run arbitrary OS commands. No reverse shell is required; output is returned directly via the API response. The vulnerability is classified under CVE‑2025‑69985 and was patched in FUXA 1.2.9. Source: Exploit‑DB 52544

📰 Original Source
https://www.exploit-db.com/exploits/52544

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.