CVE-2025-41755: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in MBS UBR-01 Mk II
A low-privileged remote attacker can exploit the ubr-logread method in wwwubr.cgi to read arbitrary files on the system. The endpoint accepts a parameter specifying the log file to open (e.g., /tmp/weblog{some_number}), but this parameter is not properly validated, allowing an attacker to modify it to reference any file and retrieve its contents.
AI Analysis
Technical Summary
CVE-2025-41755 is a CWE-22 path traversal vulnerability found in the MBS UBR-01 Mk II product. The flaw exists in the ubr-logread method within the wwwubr.cgi interface, which accepts a parameter to specify which log file to read, typically files like /tmp/weblog{some_number}. Due to improper validation of this parameter, an attacker with low privileges can manipulate the input to traverse directories and access arbitrary files on the device's filesystem. This vulnerability allows remote attackers to read sensitive files without authentication or user interaction, potentially exposing configuration files, credentials, or other confidential data stored on the device. The vulnerability has a CVSS 3.1 base score of 6.5, reflecting its medium severity, with network attack vector, low attack complexity, and no user interaction required. The impact is limited to confidentiality, as the vulnerability does not permit modification or denial of service. No patches or known exploits are currently available, but the flaw poses a significant risk to organizations relying on the affected device for network operations or infrastructure management.
Potential Impact
The primary impact of CVE-2025-41755 is unauthorized disclosure of sensitive information due to arbitrary file read capabilities. Attackers can leverage this vulnerability to access configuration files, logs, credentials, or other sensitive data stored on the device, potentially facilitating further attacks such as privilege escalation or lateral movement within a network. For organizations using the MBS UBR-01 Mk II, especially in critical infrastructure or telecommunications, this could lead to exposure of operational details or security parameters. Although the vulnerability does not allow modification or disruption of services, the confidentiality breach alone can have severe consequences, including compliance violations, reputational damage, and increased risk of subsequent attacks. The ease of exploitation over the network without user interaction increases the threat level, particularly in environments where these devices are exposed or insufficiently segmented.
Mitigation Recommendations
To mitigate CVE-2025-41755, organizations should implement the following specific measures: 1) Immediately restrict network access to the wwwubr.cgi interface, limiting it to trusted management networks or VPNs to reduce exposure. 2) Employ strict input validation and sanitization on parameters accepted by the ubr-logread method to prevent directory traversal sequences such as '../'. 3) Implement file access controls and sandboxing to ensure that the web interface can only read intended log files within a designated directory. 4) Monitor device logs and network traffic for unusual access patterns or attempts to exploit path traversal. 5) Engage with the vendor (MBS) to obtain patches or firmware updates addressing this vulnerability as soon as they become available. 6) As an interim measure, consider disabling the vulnerable functionality if it is not essential to operations. 7) Conduct regular security assessments and penetration tests focusing on web interface vulnerabilities to detect similar issues proactively.
Affected Countries
United States, Germany, Japan, South Korea, United Kingdom, France, Australia, Canada, India, Brazil
CVE-2025-41755: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in MBS UBR-01 Mk II
Description
A low-privileged remote attacker can exploit the ubr-logread method in wwwubr.cgi to read arbitrary files on the system. The endpoint accepts a parameter specifying the log file to open (e.g., /tmp/weblog{some_number}), but this parameter is not properly validated, allowing an attacker to modify it to reference any file and retrieve its contents.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-41755 is a CWE-22 path traversal vulnerability found in the MBS UBR-01 Mk II product. The flaw exists in the ubr-logread method within the wwwubr.cgi interface, which accepts a parameter to specify which log file to read, typically files like /tmp/weblog{some_number}. Due to improper validation of this parameter, an attacker with low privileges can manipulate the input to traverse directories and access arbitrary files on the device's filesystem. This vulnerability allows remote attackers to read sensitive files without authentication or user interaction, potentially exposing configuration files, credentials, or other confidential data stored on the device. The vulnerability has a CVSS 3.1 base score of 6.5, reflecting its medium severity, with network attack vector, low attack complexity, and no user interaction required. The impact is limited to confidentiality, as the vulnerability does not permit modification or denial of service. No patches or known exploits are currently available, but the flaw poses a significant risk to organizations relying on the affected device for network operations or infrastructure management.
Potential Impact
The primary impact of CVE-2025-41755 is unauthorized disclosure of sensitive information due to arbitrary file read capabilities. Attackers can leverage this vulnerability to access configuration files, logs, credentials, or other sensitive data stored on the device, potentially facilitating further attacks such as privilege escalation or lateral movement within a network. For organizations using the MBS UBR-01 Mk II, especially in critical infrastructure or telecommunications, this could lead to exposure of operational details or security parameters. Although the vulnerability does not allow modification or disruption of services, the confidentiality breach alone can have severe consequences, including compliance violations, reputational damage, and increased risk of subsequent attacks. The ease of exploitation over the network without user interaction increases the threat level, particularly in environments where these devices are exposed or insufficiently segmented.
Mitigation Recommendations
To mitigate CVE-2025-41755, organizations should implement the following specific measures: 1) Immediately restrict network access to the wwwubr.cgi interface, limiting it to trusted management networks or VPNs to reduce exposure. 2) Employ strict input validation and sanitization on parameters accepted by the ubr-logread method to prevent directory traversal sequences such as '../'. 3) Implement file access controls and sandboxing to ensure that the web interface can only read intended log files within a designated directory. 4) Monitor device logs and network traffic for unusual access patterns or attempts to exploit path traversal. 5) Engage with the vendor (MBS) to obtain patches or firmware updates addressing this vulnerability as soon as they become available. 6) As an interim measure, consider disabling the vulnerable functionality if it is not essential to operations. 7) Conduct regular security assessments and penetration tests focusing on web interface vulnerabilities to detect similar issues proactively.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- CERTVDE
- Date Reserved
- 2025-04-16T11:18:45.759Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69ae86d72904315ca3e5dbdc
Added to database: 3/9/2026, 8:37:43 AM
Last enriched: 3/16/2026, 9:40:20 AM
Last updated: 4/28/2026, 7:29:04 AM
Views: 58
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.