MikroTik RouterOS stable before 6.49.7 and long-term through 6.48.6 are vulnerable to a privilege escalation issue. A remote and authenticated attacker can escalate privileges from admin to super-admin on the Winbox or HTTP interface. The attacker can abuse this vulnerability to execute arbitrary code on the system.
History

Fri, 21 Nov 2025 16:30:00 +0000

Type Values Removed Values Added
Description MikroTik RouterOS stable before 6.49.7 and long-term through 6.48.6 are vulnerable to a privilege escalation issue. A remote and authenticated attacker can escalate privileges from admin to super-admin on the Winbox or HTTP interface. The attacker can abuse this vulnerability to execute arbitrary code on the system. MikroTik RouterOS stable before 6.49.7 and long-term through 6.48.6 are vulnerable to a privilege escalation issue. A remote and authenticated attacker can escalate privileges from admin to super-admin on the Winbox or HTTP interface. The attacker can abuse this vulnerability to execute arbitrary code on the system.
CPEs cpe:2.3:o:mikrotik:routeros:*:*:*:*:*:*:*:*

Thu, 24 Oct 2024 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2023-07-19T14:56:17.362Z

Updated: 2025-11-21T16:13:26.803Z

Reserved: 2023-04-18T10:31:45.962Z

Link: CVE-2023-30799

cve-icon Vulnrichment

Updated: 2024-08-02T14:37:15.268Z

cve-icon NVD

Status : Modified

Published: 2023-07-19T15:15:10.477

Modified: 2025-11-21T17:15:49.077

Link: CVE-2023-30799

cve-icon Redhat

No data.