CVE-2025-14220: Path Traversal in ORICO CD3510
A security vulnerability has been detected in ORICO CD3510 1.9.12. This affects an unknown function of the component File Upload. The manipulation leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-14220 identifies a path traversal vulnerability in the ORICO CD3510 device firmware version 1.9.12. The vulnerability exists in an unspecified file upload component, where insufficient validation of file paths allows an attacker to traverse directories and access or overwrite files outside the intended upload directory. The attack vector is remote network access, requiring no user interaction and only low-level privileges, which suggests the vulnerability is exploitable by unauthenticated or minimally authenticated attackers. The CVSS 4.0 base score is 5.3 (medium), reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and limited impact on confidentiality and integrity. The vendor was notified early but has not responded or released patches, increasing the risk for affected users. While no known exploits are currently active in the wild, the public disclosure raises the likelihood of future exploitation. The vulnerability could be leveraged to read sensitive configuration files, upload malicious files, or disrupt device operation by overwriting critical files, potentially enabling further compromise of the device or connected networks.
Potential Impact
For European organizations, the vulnerability poses a risk of unauthorized access to sensitive files on ORICO CD3510 devices, which may be used for network storage or data management. Exploitation could lead to partial loss of confidentiality and integrity, such as exposure of sensitive data or modification of device configurations. This could facilitate lateral movement within corporate networks, data exfiltration, or disruption of services relying on these devices. Given the lack of vendor response and patch, organizations face prolonged exposure. Industries with high reliance on network-attached storage or specialized ORICO hardware, such as manufacturing, research, or SMB sectors, may be particularly impacted. The vulnerability could also be leveraged as a foothold for further attacks, increasing overall organizational risk.
Mitigation Recommendations
Organizations should immediately identify and inventory all ORICO CD3510 devices running firmware version 1.9.12. Until a vendor patch is available, restrict network access to these devices by implementing strict firewall rules limiting access to trusted hosts and networks only. Disable or restrict the file upload functionality if possible. Monitor device logs for suspicious file access or upload attempts indicative of path traversal exploitation. Employ network segmentation to isolate vulnerable devices from critical infrastructure. Consider deploying intrusion detection/prevention systems with signatures tuned to detect path traversal attempts. Regularly back up device configurations and data to enable recovery if compromise occurs. Engage with ORICO support channels to seek updates or advisories. Finally, plan for firmware upgrades or device replacement once a patch or secure version is released.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-14220: Path Traversal in ORICO CD3510
Description
A security vulnerability has been detected in ORICO CD3510 1.9.12. This affects an unknown function of the component File Upload. The manipulation leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-14220 identifies a path traversal vulnerability in the ORICO CD3510 device firmware version 1.9.12. The vulnerability exists in an unspecified file upload component, where insufficient validation of file paths allows an attacker to traverse directories and access or overwrite files outside the intended upload directory. The attack vector is remote network access, requiring no user interaction and only low-level privileges, which suggests the vulnerability is exploitable by unauthenticated or minimally authenticated attackers. The CVSS 4.0 base score is 5.3 (medium), reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and limited impact on confidentiality and integrity. The vendor was notified early but has not responded or released patches, increasing the risk for affected users. While no known exploits are currently active in the wild, the public disclosure raises the likelihood of future exploitation. The vulnerability could be leveraged to read sensitive configuration files, upload malicious files, or disrupt device operation by overwriting critical files, potentially enabling further compromise of the device or connected networks.
Potential Impact
For European organizations, the vulnerability poses a risk of unauthorized access to sensitive files on ORICO CD3510 devices, which may be used for network storage or data management. Exploitation could lead to partial loss of confidentiality and integrity, such as exposure of sensitive data or modification of device configurations. This could facilitate lateral movement within corporate networks, data exfiltration, or disruption of services relying on these devices. Given the lack of vendor response and patch, organizations face prolonged exposure. Industries with high reliance on network-attached storage or specialized ORICO hardware, such as manufacturing, research, or SMB sectors, may be particularly impacted. The vulnerability could also be leveraged as a foothold for further attacks, increasing overall organizational risk.
Mitigation Recommendations
Organizations should immediately identify and inventory all ORICO CD3510 devices running firmware version 1.9.12. Until a vendor patch is available, restrict network access to these devices by implementing strict firewall rules limiting access to trusted hosts and networks only. Disable or restrict the file upload functionality if possible. Monitor device logs for suspicious file access or upload attempts indicative of path traversal exploitation. Employ network segmentation to isolate vulnerable devices from critical infrastructure. Consider deploying intrusion detection/prevention systems with signatures tuned to detect path traversal attempts. Regularly back up device configurations and data to enable recovery if compromise occurs. Engage with ORICO support channels to seek updates or advisories. Finally, plan for firmware upgrades or device replacement once a patch or secure version is released.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-07T15:28:28.249Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69367514232db2b37382295c
Added to database: 12/8/2025, 6:49:56 AM
Last enriched: 12/8/2025, 7:05:29 AM
Last updated: 2/4/2026, 8:42:56 AM
Views: 462
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-67851: Improper Neutralization of Formula Elements in a CSV File
MediumCVE-2026-24774: CWE-841: Improper Enforcement of Behavioral Workflow in gunet openeclass
MediumCVE-2026-24773: CWE-639: Authorization Bypass Through User-Controlled Key in gunet openeclass
HighCVE-2026-24674: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in gunet openeclass
MediumCVE-2026-24673: CWE-434: Unrestricted Upload of File with Dangerous Type in gunet openeclass
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.