Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10465: CWE-434 Unrestricted Upload of File with Dangerous Type in Birtech Information Technologies Industry and Trade Ltd. Co. Sensaway

0
High
VulnerabilityCVE-2025-10465cvecve-2025-10465cwe-434
Published: Mon Feb 09 2026 (02/09/2026, 12:57:37 UTC)
Source: CVE Database V5
Vendor/Project: Birtech Information Technologies Industry and Trade Ltd. Co.
Product: Sensaway

Description

Unrestricted Upload of File with Dangerous Type vulnerability in Birtech Information Technologies Industry and Trade Ltd. Co. Sensaway allows Upload a Web Shell to a Web Server.This issue affects Sensaway: through 09022026. NOTE: Because the product was developed using outdated technology, the manufacturer is unable to fix the relevant vulnerabilities. Users of the Sensaway application are advised to contact the manufacturer and review updated products developed with newer technology.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 00:26:21 UTC

Technical Analysis

CVE-2025-10465 is a critical vulnerability classified under CWE-434, indicating an unrestricted upload of files with dangerous types in the Sensaway application developed by Birtech Information Technologies Industry and Trade Ltd. Co. This flaw allows an attacker with low privileges to upload arbitrary files, including web shells, to the web server hosting Sensaway. The vulnerability arises from insufficient validation or filtering of uploaded file types, enabling attackers to bypass restrictions and place executable malicious scripts on the server. Once a web shell is uploaded, attackers can execute arbitrary commands remotely, leading to full system compromise. The CVSS v3.1 score of 8.8 reflects high impact across confidentiality, integrity, and availability, with network attack vector, low attack complexity, and no user interaction required. The vendor has not provided patches due to the product’s outdated technology stack, leaving users exposed. The vulnerability affects all versions up to the specified date, and no known exploits have been reported in the wild yet. However, the potential for exploitation is significant given the ease of attack and the critical nature of the flaw. Organizations relying on Sensaway should urgently assess their exposure and consider migration to modern, supported solutions. In the interim, strict access controls, file upload restrictions, and monitoring for suspicious activity are essential.

Potential Impact

The unrestricted file upload vulnerability enables attackers to deploy web shells, which can lead to complete compromise of the affected web server. This results in unauthorized access to sensitive data, modification or deletion of critical files, and disruption of services. Attackers can leverage this access to move laterally within the network, escalate privileges, and establish persistent footholds. The confidentiality of organizational data is at high risk, as attackers can exfiltrate information. Integrity is compromised through unauthorized changes to data or system configurations. Availability may be affected if attackers disrupt services or deploy ransomware. Given the lack of vendor patches, organizations face prolonged exposure, increasing the likelihood of targeted attacks. The impact extends beyond individual organizations to potentially critical infrastructure or sectors relying on Sensaway, amplifying the threat’s severity on a global scale.

Mitigation Recommendations

Since no official patches are available, organizations must implement compensating controls immediately. These include disabling file upload functionality if not essential, or restricting uploads to strictly validated file types using allowlists and MIME type verification. Employ web application firewalls (WAFs) with rules to detect and block web shell signatures and suspicious upload patterns. Enforce strict access controls and least privilege principles to limit who can upload files. Monitor server logs and network traffic for anomalies indicative of exploitation attempts. Isolate the Sensaway application environment to reduce lateral movement risk. Consider deploying runtime application self-protection (RASP) solutions to detect malicious behavior in real time. Plan and execute migration to updated, supported products developed with modern secure coding practices. Regularly back up critical data and test restoration procedures to mitigate potential ransomware or destructive attacks stemming from exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
TR-CERT
Date Reserved
2025-09-15T07:21:57.701Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6989e1a74b57a58fa150c5d1

Added to database: 2/9/2026, 1:31:19 PM

Last enriched: 3/26/2026, 12:26:21 AM

Last updated: 3/26/2026, 9:48:04 PM

Views: 86

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses