Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41772: CWE-598 Use of GET Request Method With Sensitive Query Strings in MBS UBR-01 Mk II

0
High
VulnerabilityCVE-2025-41772cvecve-2025-41772cwe-598
Published: Mon Mar 09 2026 (03/09/2026, 08:18:49 UTC)
Source: CVE Database V5
Vendor/Project: MBS
Product: UBR-01 Mk II

Description

An unauthenticated remote attacker can obtain valid session tokens because they are exposed in plaintext within the URL parameters of the wwwupdate.cgi endpoint in UBR.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/16/2026, 09:47:15 UTC

Technical Analysis

CVE-2025-41772 is a vulnerability identified in the MBS UBR-01 Mk II device, specifically in the wwwupdate.cgi endpoint. The core issue is the use of the HTTP GET request method to transmit sensitive session tokens as query parameters in the URL. According to CWE-598, using GET requests with sensitive data is insecure because URLs can be logged in browser history, server logs, network devices, and proxies, exposing sensitive information to unauthorized parties. In this case, valid session tokens are exposed in plaintext within the URL, allowing unauthenticated remote attackers to intercept or retrieve these tokens without any authentication or user interaction. This enables attackers to hijack sessions or gain unauthorized access to the device's management interface or services relying on these tokens. The vulnerability affects version 0.0.0 of the product, with no patches currently available. The CVSS 3.1 base score is 7.5, reflecting high severity due to the ease of exploitation (network accessible, no privileges or user interaction required) and the high confidentiality impact. Integrity and availability impacts are rated as none. Although no exploits have been reported in the wild, the exposure of session tokens in URLs represents a significant security risk, especially in environments where these devices manage critical infrastructure or sensitive data. The vulnerability was reserved in April 2025 and published in March 2026 by CERTVDE.

Potential Impact

The primary impact of this vulnerability is the compromise of confidentiality through session token leakage. Attackers can obtain valid session tokens without authentication, enabling unauthorized access to the affected device's management interfaces or services. This can lead to unauthorized configuration changes, data exposure, or further lateral movement within a network. While integrity and availability are not directly impacted, the unauthorized access enabled by token theft can indirectly lead to malicious modifications or service disruptions. Organizations deploying MBS UBR-01 Mk II devices in critical infrastructure, telecommunications, or enterprise networks face increased risk of targeted attacks. The ease of exploitation and network accessibility mean that attackers can remotely compromise devices without user interaction, increasing the likelihood of automated scanning and exploitation attempts once the vulnerability becomes widely known. The lack of patches further elevates risk, necessitating immediate mitigation efforts.

Mitigation Recommendations

1. Immediately restrict access to the wwwupdate.cgi endpoint by implementing network-level controls such as firewall rules or VPN-only access to management interfaces. 2. Disable or limit the use of HTTP GET requests for sensitive operations; if possible, configure the device or update firmware to use POST requests or other secure methods that do not expose tokens in URLs. 3. Implement strict logging and monitoring of access to the vulnerable endpoint to detect suspicious activity or token harvesting attempts. 4. Rotate session tokens frequently and invalidate tokens exposed in URLs to minimize the window of exploitation. 5. If possible, isolate affected devices within segmented network zones with limited exposure to untrusted networks. 6. Engage with the vendor (MBS) to obtain patches or firmware updates addressing this vulnerability. 7. Educate administrators on the risks of exposing session tokens in URLs and enforce secure session management practices. 8. Consider deploying web application firewalls (WAFs) or intrusion detection systems (IDS) with custom rules to detect and block attempts to exploit this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
CERTVDE
Date Reserved
2025-04-16T11:18:45.761Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69ae86d82904315ca3e5dc45

Added to database: 3/9/2026, 8:37:44 AM

Last enriched: 3/16/2026, 9:47:15 AM

Last updated: 4/23/2026, 11:30:47 AM

Views: 79

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses