Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2025-27025


The target device exposes a service on a specific TCP port with a configured endpoint. The access to that endpoint is granted using a Basic Authentication method. The endpoint accepts also the PUT method and it is possible to write files on the target device file system. Files are written as root. Using Postman it is possible to perform a Directory Traversal attack and write files into any location of the device file system. Similarly to the PUT method, it is possible to leverage the same mechanism to read any file from the file system by using the GET method.


Published

2025-07-02T10:15:22.880

Last Modified

2025-07-03T15:13:53.147

Status

Awaiting Analysis

Source

a6d3dc9e-0591-4a13-bce7-0f5b31ff6158

Severity

CVSSv3.1: 8.8 (HIGH)

Weaknesses
  • Type: Secondary
    CWE-280

Affected Vendors & Products

-


References