FKIE_CVE-2025-27025
Vulnerability from fkie_nvd - Published: 2025-07-02 10:15 - Updated: 2025-07-03 15:13
Severity ?
Summary
The target device exposes a service on a specific TCP port with a configured
endpoint. The access to that endpoint is granted using a Basic Authentication
method. The endpoint accepts also the PUT method and it is possible to
write files on the target device file system. Files are written as root.
Using Postman it is possible to perform a Directory Traversal attack
and write files into any location of the device file system. Similarly to the PUT method, it is possible to leverage the
same mechanism to read any file from the file system by using the GET
method.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The target device exposes a service on a specific TCP port with a configured\n endpoint. The access to that endpoint is granted using a Basic Authentication\n method. The endpoint accepts also the PUT method and it is possible to \nwrite files on the target device file system. Files are written as root.\n Using Postman it is possible to perform a Directory Traversal attack \nand write files into any location of the device file system. Similarly to the PUT method, it is possible to leverage the \nsame mechanism to read any file from the file system by using the GET \nmethod."
},
{
"lang": "es",
"value": "El dispositivo objetivo expone un servicio en un puerto TCP espec\u00edfico con un endpoint configurado. El acceso a dicho endpoint se otorga mediante un m\u00e9todo de autenticaci\u00f3n b\u00e1sica. El endpoint tambi\u00e9n acepta el m\u00e9todo PUT y permite escribir archivos en el sistema de archivos del dispositivo objetivo. Los archivos se escriben como root. Con Postman, es posible realizar un ataque de Directory Traversal y escribir archivos en cualquier ubicaci\u00f3n del sistema de archivos del dispositivo. De forma similar al m\u00e9todo PUT, es posible utilizar el mismo mecanismo para leer cualquier archivo del sistema de archivos mediante el m\u00e9todo GET."
}
],
"id": "CVE-2025-27025",
"lastModified": "2025-07-03T15:13:53.147",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158",
"type": "Secondary"
}
]
},
"published": "2025-07-02T10:15:22.880",
"references": [
{
"source": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158",
"url": "https://euvd.enisa.europa.eu/vulnerability/CVE-2025-27025"
},
{
"source": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158",
"url": "https://www.cvcn.gov.it/cvcn/cve/CVE-2025-27025"
}
],
"sourceIdentifier": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-280"
}
],
"source": "a6d3dc9e-0591-4a13-bce7-0f5b31ff6158",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…