CVE-2025-41758: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in MBS UBR-01 Mk II
CVE-2025-41758 is a high-severity path traversal vulnerability in the MBS UBR-01 Mk II device, exploitable via the wwupload. cgi endpoint. A low-privileged remote attacker can leverage this flaw to perform arbitrary file writes, potentially overwriting critical system files. This can lead to full system compromise without requiring user interaction. The vulnerability stems from improper limitation of pathname inputs, classified under CWE-22. Although no public exploits are currently known, the CVSS score of 8. 8 indicates a significant risk. The affected product is a specialized device, and no patches have been released yet. Organizations using this device should prioritize mitigation to prevent unauthorized access and control. The threat is particularly relevant to countries with deployments of MBS UBR-01 Mk II devices in critical infrastructure or enterprise environments.
AI Analysis
Technical Summary
CVE-2025-41758 is a path traversal vulnerability identified in the MBS UBR-01 Mk II device, specifically within the wwupload.cgi endpoint. This vulnerability arises due to improper validation and limitation of pathname inputs, allowing an attacker with low privileges to craft requests that traverse directories and write arbitrary files on the device’s filesystem. The ability to overwrite arbitrary files can enable attackers to replace or modify system binaries, configuration files, or scripts, ultimately leading to full system compromise. The vulnerability does not require user interaction and can be exploited remotely over the network, increasing its risk profile. The CVSS v3.1 score of 8.8 reflects high impact on confidentiality, integrity, and availability, with low attack complexity and only low privileges required. No patches or mitigations have been officially released at the time of publication, and no known exploits have been observed in the wild. The vulnerability is categorized under CWE-22, highlighting the failure to properly restrict pathname inputs to a safe directory. This flaw is critical for organizations relying on MBS UBR-01 Mk II devices, which may be used in network infrastructure or specialized industrial environments.
Potential Impact
The exploitation of CVE-2025-41758 can have severe consequences for affected organizations. An attacker gaining the ability to write arbitrary files can overwrite system executables or configuration files, resulting in full device compromise. This can lead to unauthorized access, data theft, disruption of device functionality, or use of the device as a foothold for lateral movement within a network. Given the device’s likely role in network or industrial environments, compromise could disrupt critical services or infrastructure. The remote and low-privilege nature of the exploit increases the attack surface, making it easier for attackers to target vulnerable devices exposed to untrusted networks. The lack of user interaction requirement further elevates the risk. Organizations may face operational downtime, data breaches, and potential regulatory consequences if exploited. The absence of patches means that mitigation relies heavily on network controls and monitoring until a fix is available.
Mitigation Recommendations
To mitigate CVE-2025-41758, organizations should implement the following specific measures: 1) Immediately isolate MBS UBR-01 Mk II devices from untrusted networks or restrict access to the wwupload.cgi endpoint using network segmentation and firewall rules. 2) Employ strict access controls and authentication mechanisms to limit who can interact with the device’s management interfaces. 3) Monitor network traffic for suspicious requests targeting the wwupload.cgi endpoint, particularly those containing path traversal patterns (e.g., '../'). 4) Use intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect exploitation attempts. 5) Regularly audit device configurations and file integrity to detect unauthorized changes. 6) Engage with the vendor (MBS) to obtain patches or firmware updates as soon as they become available. 7) Consider deploying compensating controls such as application-layer gateways or reverse proxies that can sanitize inputs to vulnerable endpoints. 8) Maintain an incident response plan tailored to potential device compromise scenarios. These steps go beyond generic advice by focusing on network-level restrictions, active monitoring, and vendor engagement.
Affected Countries
United States, Germany, Japan, South Korea, United Kingdom, France, Canada, Australia, Netherlands, Singapore
CVE-2025-41758: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in MBS UBR-01 Mk II
Description
CVE-2025-41758 is a high-severity path traversal vulnerability in the MBS UBR-01 Mk II device, exploitable via the wwupload. cgi endpoint. A low-privileged remote attacker can leverage this flaw to perform arbitrary file writes, potentially overwriting critical system files. This can lead to full system compromise without requiring user interaction. The vulnerability stems from improper limitation of pathname inputs, classified under CWE-22. Although no public exploits are currently known, the CVSS score of 8. 8 indicates a significant risk. The affected product is a specialized device, and no patches have been released yet. Organizations using this device should prioritize mitigation to prevent unauthorized access and control. The threat is particularly relevant to countries with deployments of MBS UBR-01 Mk II devices in critical infrastructure or enterprise environments.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-41758 is a path traversal vulnerability identified in the MBS UBR-01 Mk II device, specifically within the wwupload.cgi endpoint. This vulnerability arises due to improper validation and limitation of pathname inputs, allowing an attacker with low privileges to craft requests that traverse directories and write arbitrary files on the device’s filesystem. The ability to overwrite arbitrary files can enable attackers to replace or modify system binaries, configuration files, or scripts, ultimately leading to full system compromise. The vulnerability does not require user interaction and can be exploited remotely over the network, increasing its risk profile. The CVSS v3.1 score of 8.8 reflects high impact on confidentiality, integrity, and availability, with low attack complexity and only low privileges required. No patches or mitigations have been officially released at the time of publication, and no known exploits have been observed in the wild. The vulnerability is categorized under CWE-22, highlighting the failure to properly restrict pathname inputs to a safe directory. This flaw is critical for organizations relying on MBS UBR-01 Mk II devices, which may be used in network infrastructure or specialized industrial environments.
Potential Impact
The exploitation of CVE-2025-41758 can have severe consequences for affected organizations. An attacker gaining the ability to write arbitrary files can overwrite system executables or configuration files, resulting in full device compromise. This can lead to unauthorized access, data theft, disruption of device functionality, or use of the device as a foothold for lateral movement within a network. Given the device’s likely role in network or industrial environments, compromise could disrupt critical services or infrastructure. The remote and low-privilege nature of the exploit increases the attack surface, making it easier for attackers to target vulnerable devices exposed to untrusted networks. The lack of user interaction requirement further elevates the risk. Organizations may face operational downtime, data breaches, and potential regulatory consequences if exploited. The absence of patches means that mitigation relies heavily on network controls and monitoring until a fix is available.
Mitigation Recommendations
To mitigate CVE-2025-41758, organizations should implement the following specific measures: 1) Immediately isolate MBS UBR-01 Mk II devices from untrusted networks or restrict access to the wwupload.cgi endpoint using network segmentation and firewall rules. 2) Employ strict access controls and authentication mechanisms to limit who can interact with the device’s management interfaces. 3) Monitor network traffic for suspicious requests targeting the wwupload.cgi endpoint, particularly those containing path traversal patterns (e.g., '../'). 4) Use intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect exploitation attempts. 5) Regularly audit device configurations and file integrity to detect unauthorized changes. 6) Engage with the vendor (MBS) to obtain patches or firmware updates as soon as they become available. 7) Consider deploying compensating controls such as application-layer gateways or reverse proxies that can sanitize inputs to vulnerable endpoints. 8) Maintain an incident response plan tailored to potential device compromise scenarios. These steps go beyond generic advice by focusing on network-level restrictions, active monitoring, and vendor engagement.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- CERTVDE
- Date Reserved
- 2025-04-16T11:18:45.760Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69ae86d72904315ca3e5dbe5
Added to database: 3/9/2026, 8:37:43 AM
Last enriched: 3/16/2026, 7:15:38 PM
Last updated: 4/28/2026, 7:28:27 AM
Views: 60
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.