Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-29846: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Synology Synology Router Manager (SRM)

0
High
VulnerabilityCVE-2025-29846cvecve-2025-29846
Published: Thu Dec 04 2025 (12/04/2025, 15:01:51 UTC)
Source: CVE Database V5
Vendor/Project: Synology
Product: Synology Router Manager (SRM)

Description

A vulnerability in portenable cgi allows remote authenticated users to get the status of installed packages.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 04:58:41 UTC

Technical Analysis

CVE-2025-29846 is a path traversal vulnerability identified in Synology Router Manager (SRM) version 1.3, specifically within the portenable.cgi interface. The flaw arises from improper limitation of pathname inputs, allowing remote authenticated users to circumvent directory restrictions and retrieve the status of installed packages. This vulnerability is exploitable over the network (AV:N) with low attack complexity (AC:L), but requires high-level privileges (PR:H) and no user interaction (UI:N). The scope is unchanged (S:U), but the impact is high across confidentiality, integrity, and availability (C:H/I:H/A:H). By exploiting this vulnerability, an attacker could gain unauthorized insight into installed packages, potentially leading to further exploitation or lateral movement within the network. Although no public exploits are currently known, the vulnerability's nature and impact warrant immediate attention. The vulnerability was reserved in March 2025 and published in December 2025, indicating recent discovery and disclosure. Synology SRM is widely used in small to medium enterprise and home network environments, making this a significant risk for affected users.

Potential Impact

The vulnerability compromises the confidentiality, integrity, and availability of affected Synology SRM devices. Attackers with authenticated access can bypass directory restrictions to access sensitive package status information, which may reveal system configurations and potential attack vectors. This can facilitate further exploitation, unauthorized system modifications, or denial of service conditions. Given the network-exposed nature of SRM devices, exploitation could lead to lateral movement within organizational networks, impacting broader infrastructure. The requirement for high privileges limits exploitation to insiders or compromised accounts, but the high impact on system security and potential for escalation makes this a critical concern. Organizations relying on Synology SRM for network management face risks of data leakage, service disruption, and increased attack surface.

Mitigation Recommendations

Organizations should immediately verify if they are running Synology SRM version 1.3 and prioritize upgrading to a patched version once available. In the absence of a patch, restrict access to the SRM management interface to trusted networks and enforce strong authentication and account management policies to prevent unauthorized access. Implement network segmentation to isolate SRM devices from critical infrastructure. Monitor logs for unusual access patterns to portenable.cgi or other management interfaces. Employ intrusion detection systems to detect potential exploitation attempts. Additionally, disable or limit the use of portenable.cgi if feasible, or apply web application firewall (WAF) rules to block suspicious path traversal attempts. Regularly audit installed packages and system configurations to detect unauthorized changes.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
synology
Date Reserved
2025-03-12T02:19:15.676Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6931a58504d931fa5b3e25ce

Added to database: 12/4/2025, 3:15:17 PM

Last enriched: 2/27/2026, 4:58:41 AM

Last updated: 3/25/2026, 3:56:19 AM

Views: 142

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses