Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41723: CWE-35:Path Traversal: '.../...//' in Sauter modulo 6 devices modu680-AS

0
Critical
VulnerabilityCVE-2025-41723cvecve-2025-41723cwe-35
Published: Wed Oct 22 2025 (10/22/2025, 07:01:09 UTC)
Source: CVE Database V5
Vendor/Project: Sauter
Product: modulo 6 devices modu680-AS

Description

The importFile SOAP method is vulnerable to a directory traversal attack. An unauthenticated remote attacker bypass the path restriction and upload files to arbitrary locations.

AI-Powered Analysis

AILast updated: 10/29/2025, 08:06:27 UTC

Technical Analysis

CVE-2025-41723 is a critical security vulnerability classified under CWE-35 (Path Traversal) affecting the importFile SOAP method in Sauter's modulo 6 devices, specifically the modu680-AS model. The vulnerability arises because the importFile method fails to properly validate or sanitize file path inputs, allowing an attacker to use directory traversal sequences such as '.../...//' to escape intended directories and upload files to arbitrary locations on the device's filesystem. This flaw can be exploited remotely without any authentication or user interaction, making it highly accessible to attackers. Successful exploitation can lead to arbitrary file uploads, enabling attackers to place malicious payloads, overwrite critical files, or implant backdoors, thereby compromising the confidentiality, integrity, and availability of the device and potentially the broader network it controls. The CVSS v3.1 score of 9.8 reflects the high impact and ease of exploitation. The vulnerability affects version 0.0.0 of the product, which likely indicates all currently available versions or an unspecified version baseline. No patches have been published yet, and no known exploits are reported in the wild, but the critical nature demands immediate attention. The affected product is used in industrial automation and building management systems, which are often integral to critical infrastructure and operational technology environments.

Potential Impact

For European organizations, this vulnerability poses a severe risk, especially those in sectors relying on industrial control systems (ICS), building automation, and critical infrastructure such as energy, manufacturing, and transportation. Exploitation could allow attackers to gain persistent access, disrupt operations, steal sensitive operational data, or cause physical damage by manipulating control systems. The unauthenticated nature of the vulnerability increases the likelihood of exploitation by external threat actors, including cybercriminals and nation-state groups. Given Europe's strong industrial base and regulatory focus on cybersecurity in critical infrastructure, the impact could extend to economic disruption, safety hazards, and regulatory non-compliance. Additionally, the ability to upload arbitrary files could facilitate ransomware deployment or lateral movement within networks, amplifying the threat to European enterprises and public sector entities.

Mitigation Recommendations

Since no official patches are currently available, European organizations should implement immediate compensating controls. These include isolating the affected devices from untrusted networks and restricting access to the SOAP interface via network segmentation and firewall rules. Employ strict access control lists (ACLs) to limit communication to trusted management stations only. Monitor network traffic for unusual file upload activities or anomalous SOAP requests indicative of exploitation attempts. Deploy intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics targeting directory traversal and unauthorized file uploads. Engage with Sauter for updates on patches or firmware upgrades and plan for timely deployment once available. Additionally, conduct thorough audits of device configurations and logs to detect any signs of compromise. Implement robust backup and recovery procedures to mitigate potential damage from successful attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERTVDE
Date Reserved
2025-04-16T11:17:48.318Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f886d515c9ea51bb7190c2

Added to database: 10/22/2025, 7:25:09 AM

Last enriched: 10/29/2025, 8:06:27 AM

Last updated: 12/5/2025, 4:56:05 PM

Views: 91

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats