Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41758: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in MBS UBR-01 Mk II

0
High
VulnerabilityCVE-2025-41758cvecve-2025-41758cwe-22
Published: Mon Mar 09 2026 (03/09/2026, 08:16:30 UTC)
Source: CVE Database V5
Vendor/Project: MBS
Product: UBR-01 Mk II

Description

CVE-2025-41758 is a high-severity path traversal vulnerability in the MBS UBR-01 Mk II device, exploitable via the wwupload. cgi endpoint. A low-privileged remote attacker can leverage this flaw to perform arbitrary file writes, potentially overwriting critical system files. This can lead to full system compromise without requiring user interaction. The vulnerability stems from improper limitation of pathname inputs, classified under CWE-22. Although no public exploits are currently known, the CVSS score of 8. 8 indicates a significant risk. The affected product is a specialized device, and no patches have been released yet. Organizations using this device should prioritize mitigation to prevent unauthorized access and control. The threat is particularly relevant to countries with deployments of MBS UBR-01 Mk II devices in critical infrastructure or enterprise environments.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/16/2026, 19:15:38 UTC

Technical Analysis

CVE-2025-41758 is a path traversal vulnerability identified in the MBS UBR-01 Mk II device, specifically within the wwupload.cgi endpoint. This vulnerability arises due to improper validation and limitation of pathname inputs, allowing an attacker with low privileges to craft requests that traverse directories and write arbitrary files on the device’s filesystem. The ability to overwrite arbitrary files can enable attackers to replace or modify system binaries, configuration files, or scripts, ultimately leading to full system compromise. The vulnerability does not require user interaction and can be exploited remotely over the network, increasing its risk profile. The CVSS v3.1 score of 8.8 reflects high impact on confidentiality, integrity, and availability, with low attack complexity and only low privileges required. No patches or mitigations have been officially released at the time of publication, and no known exploits have been observed in the wild. The vulnerability is categorized under CWE-22, highlighting the failure to properly restrict pathname inputs to a safe directory. This flaw is critical for organizations relying on MBS UBR-01 Mk II devices, which may be used in network infrastructure or specialized industrial environments.

Potential Impact

The exploitation of CVE-2025-41758 can have severe consequences for affected organizations. An attacker gaining the ability to write arbitrary files can overwrite system executables or configuration files, resulting in full device compromise. This can lead to unauthorized access, data theft, disruption of device functionality, or use of the device as a foothold for lateral movement within a network. Given the device’s likely role in network or industrial environments, compromise could disrupt critical services or infrastructure. The remote and low-privilege nature of the exploit increases the attack surface, making it easier for attackers to target vulnerable devices exposed to untrusted networks. The lack of user interaction requirement further elevates the risk. Organizations may face operational downtime, data breaches, and potential regulatory consequences if exploited. The absence of patches means that mitigation relies heavily on network controls and monitoring until a fix is available.

Mitigation Recommendations

To mitigate CVE-2025-41758, organizations should implement the following specific measures: 1) Immediately isolate MBS UBR-01 Mk II devices from untrusted networks or restrict access to the wwupload.cgi endpoint using network segmentation and firewall rules. 2) Employ strict access controls and authentication mechanisms to limit who can interact with the device’s management interfaces. 3) Monitor network traffic for suspicious requests targeting the wwupload.cgi endpoint, particularly those containing path traversal patterns (e.g., '../'). 4) Use intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect exploitation attempts. 5) Regularly audit device configurations and file integrity to detect unauthorized changes. 6) Engage with the vendor (MBS) to obtain patches or firmware updates as soon as they become available. 7) Consider deploying compensating controls such as application-layer gateways or reverse proxies that can sanitize inputs to vulnerable endpoints. 8) Maintain an incident response plan tailored to potential device compromise scenarios. These steps go beyond generic advice by focusing on network-level restrictions, active monitoring, and vendor engagement.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
CERTVDE
Date Reserved
2025-04-16T11:18:45.760Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69ae86d72904315ca3e5dbe5

Added to database: 3/9/2026, 8:37:43 AM

Last enriched: 3/16/2026, 7:15:38 PM

Last updated: 4/28/2026, 7:28:27 AM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses