[CIVN-2026-0032] SQL injection vulnerability in Advantech Products

By Published On: January 20, 2026

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
SQL injection vulnerability in Advantech Products 
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: CRITICAL
Software Affected
IoTSuite SaaS Composer versions prior to 3.4.15
IoTSuite Growth (Linux, Docker) versions prior to 2.0.2
IoTSuite Starter (Linux, Docker) versions prior to 2.0.2
IoT Edge (Linux, Docker) versions prior to 2.0.2
IoT Edge (Windows) versions prior to 2.0.2
Overview
A vulnerability has been reported in Advantech products, which could be exploited by an unauthenticated attacker to execute arbitrary code on the targeted system.
Target Audience:
Users of affected Advantech Products
Risk Audience:
High risk of unauthenticated SQL injection leading to data compromise and service disruption.
Impact Assessment:
Potential for data theft, unauthorized data modification, service disruption, and potential compromise of the affected system.
Description
Advantech products are industrial computers and IoT solutions used for automation, edge computing, and smart industry applications.
A vulnerability exists in Advantech Products due to an SQL injection vulnerability in its Core server. An attacker could exploit this vulnerability by injecting specially crafted requests on the affected system.
Successful exploitation of this vulnerability may allow an unauthenticated attacker to execute arbitrary code on the targeted system.
Solution
Apply appropriate software updates as mentioned in below security advisory:
https://www.advantech.com/en/security-advisory
Vendor Information
Advantech
https://www.advantech.com/en/security-advisory
References
Advantech
https://www.advantech.com/en/security-advisory
CVE Name
CVE-2025-52694
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=3nYf
—–END PGP SIGNATURE—–

Share this article