CVE-2025-30515: CWE-35 in CyberData 011209 SIP Emergency Intercom
CyberData 011209 Intercom could allow an authenticated attacker to upload arbitrary files to multiple locations within the system.
AI Analysis
Technical Summary
CVE-2025-30515 is a critical vulnerability identified in the CyberData 011209 SIP Emergency Intercom device. The vulnerability is classified under CWE-35, which corresponds to Path Traversal issues. This flaw allows an authenticated attacker to upload arbitrary files to multiple locations within the system. The vulnerability has a CVSS v3.1 base score of 9.8, indicating a critical severity level. The CVSS vector (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) reveals that the attack can be performed remotely over the network without requiring any privileges or user interaction, and it impacts confidentiality, integrity, and availability at a high level. Technically, the vulnerability arises because the device's file upload functionality does not properly validate or sanitize file paths, allowing attackers to traverse directories and place malicious files in arbitrary locations. This can lead to full system compromise, including the execution of malicious code, data exfiltration, or disruption of device functionality. Since the device is a SIP Emergency Intercom, it is likely deployed in critical communication environments such as public safety, industrial facilities, or enterprise buildings, where availability and integrity of communication are paramount. No patches or mitigations have been officially released yet, and there are no known exploits in the wild at the time of publication. However, the ease of exploitation combined with the critical impact makes this vulnerability a significant threat to organizations using this product.
Potential Impact
For European organizations, the impact of this vulnerability can be severe. The CyberData 011209 SIP Emergency Intercom is typically used in environments requiring reliable emergency communication, such as hospitals, transportation hubs, educational institutions, and government buildings. Exploitation could allow attackers to disrupt emergency communication systems, potentially endangering lives and causing operational downtime. Confidentiality breaches could expose sensitive communication or facility information, while integrity compromises could allow attackers to inject false messages or commands. Availability impacts could result in denial of emergency communication services. Given the critical nature of emergency intercoms, any disruption or compromise could have cascading effects on public safety and organizational resilience. Additionally, the ability to upload arbitrary files could be leveraged to establish persistent footholds or pivot to other network segments, increasing the risk of broader network compromise.
Mitigation Recommendations
Since no official patches are currently available, European organizations should implement immediate compensating controls. First, restrict network access to the CyberData 011209 devices by placing them behind firewalls or network segmentation to limit exposure to untrusted networks. Enforce strict authentication and access controls to ensure only authorized personnel can interact with the device. Monitor device logs and network traffic for unusual file upload activity or unexpected file changes. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect path traversal or anomalous file operations. If possible, disable or limit file upload functionality until a patch is released. Maintain an inventory of all deployed CyberData 011209 devices and prioritize their remediation. Once a vendor patch is available, apply it promptly and verify the fix. Additionally, conduct regular security assessments and penetration tests focused on these devices to identify residual risks.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-30515: CWE-35 in CyberData 011209 SIP Emergency Intercom
Description
CyberData 011209 Intercom could allow an authenticated attacker to upload arbitrary files to multiple locations within the system.
AI-Powered Analysis
Technical Analysis
CVE-2025-30515 is a critical vulnerability identified in the CyberData 011209 SIP Emergency Intercom device. The vulnerability is classified under CWE-35, which corresponds to Path Traversal issues. This flaw allows an authenticated attacker to upload arbitrary files to multiple locations within the system. The vulnerability has a CVSS v3.1 base score of 9.8, indicating a critical severity level. The CVSS vector (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) reveals that the attack can be performed remotely over the network without requiring any privileges or user interaction, and it impacts confidentiality, integrity, and availability at a high level. Technically, the vulnerability arises because the device's file upload functionality does not properly validate or sanitize file paths, allowing attackers to traverse directories and place malicious files in arbitrary locations. This can lead to full system compromise, including the execution of malicious code, data exfiltration, or disruption of device functionality. Since the device is a SIP Emergency Intercom, it is likely deployed in critical communication environments such as public safety, industrial facilities, or enterprise buildings, where availability and integrity of communication are paramount. No patches or mitigations have been officially released yet, and there are no known exploits in the wild at the time of publication. However, the ease of exploitation combined with the critical impact makes this vulnerability a significant threat to organizations using this product.
Potential Impact
For European organizations, the impact of this vulnerability can be severe. The CyberData 011209 SIP Emergency Intercom is typically used in environments requiring reliable emergency communication, such as hospitals, transportation hubs, educational institutions, and government buildings. Exploitation could allow attackers to disrupt emergency communication systems, potentially endangering lives and causing operational downtime. Confidentiality breaches could expose sensitive communication or facility information, while integrity compromises could allow attackers to inject false messages or commands. Availability impacts could result in denial of emergency communication services. Given the critical nature of emergency intercoms, any disruption or compromise could have cascading effects on public safety and organizational resilience. Additionally, the ability to upload arbitrary files could be leveraged to establish persistent footholds or pivot to other network segments, increasing the risk of broader network compromise.
Mitigation Recommendations
Since no official patches are currently available, European organizations should implement immediate compensating controls. First, restrict network access to the CyberData 011209 devices by placing them behind firewalls or network segmentation to limit exposure to untrusted networks. Enforce strict authentication and access controls to ensure only authorized personnel can interact with the device. Monitor device logs and network traffic for unusual file upload activity or unexpected file changes. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect path traversal or anomalous file operations. If possible, disable or limit file upload functionality until a patch is released. Maintain an inventory of all deployed CyberData 011209 devices and prioritize their remediation. Once a vendor patch is available, apply it promptly and verify the fix. Additionally, conduct regular security assessments and penetration tests focused on these devices to identify residual risks.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- icscert
- Date Reserved
- 2025-03-26T16:22:34.706Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68487f541b0bd07c3938a024
Added to database: 6/10/2025, 6:54:12 PM
Last enriched: 7/10/2025, 11:48:41 PM
Last updated: 1/7/2026, 4:23:30 AM
Views: 60
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.