Skip to main content

CVE-2025-49162: CWE-424 Improper Protection of Alternate Path in Arris VIP1113

Medium
VulnerabilityCVE-2025-49162cvecve-2025-49162cwe-424
Published: Mon Jun 02 2025 (06/02/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Arris
Product: VIP1113

Description

Arris VIP1113 devices through 2025-05-30 with KreaTV SDK allow file overwrite via TFTP because a remote filename with a space character allows an attacker to control the local filename.

AI-Powered Analysis

AILast updated: 07/11/2025, 07:33:41 UTC

Technical Analysis

CVE-2025-49162 is a vulnerability identified in the Arris VIP1113 device, which utilizes the KreaTV SDK. The issue arises due to improper protection of alternate file paths (CWE-424) during TFTP (Trivial File Transfer Protocol) operations. Specifically, the vulnerability allows an attacker to perform a file overwrite by exploiting the handling of remote filenames containing space characters. When a remote filename includes a space, the device's TFTP implementation incorrectly processes the filename, enabling the attacker to control the local filename used during the file transfer. This flaw can be leveraged to overwrite arbitrary files on the device's filesystem remotely without requiring authentication or user interaction. The vulnerability has a CVSS 3.1 base score of 6.4, indicating a medium severity level. The vector metrics show that the attack requires physical proximity or network access (Attack Vector: Physical), high attack complexity, no privileges required, no user interaction, and impacts confidentiality, integrity, and availability to a high degree. The vulnerability was published on June 2, 2025, and no known exploits have been reported in the wild yet. The absence of patches or mitigation links suggests that the vendor has not yet released an official fix. The root cause is the improper handling of alternate file paths during TFTP file transfers, which is a common protocol used for device configuration and firmware updates. Exploiting this vulnerability could allow attackers to overwrite critical system files, potentially leading to device compromise, denial of service, or persistent unauthorized access.

Potential Impact

For European organizations using Arris VIP1113 devices, particularly in sectors relying on these devices for IPTV or similar services, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized modification or destruction of device firmware or configuration files, resulting in service disruption or device bricking. Confidential data stored or processed by the device could be exposed or altered, impacting data integrity and confidentiality. Given the medium CVSS score but high impact on confidentiality, integrity, and availability, attackers could leverage this flaw to establish a foothold within internal networks, especially if these devices are connected to critical infrastructure or enterprise networks. The requirement for physical or local network access somewhat limits remote exploitation but does not eliminate risk, especially in environments where network segmentation is weak or where attackers have insider access. The lack of known exploits currently provides a window for proactive mitigation, but the vulnerability's nature suggests that once exploited, recovery could be complex and costly.

Mitigation Recommendations

1. Network Segmentation: Isolate Arris VIP1113 devices on dedicated VLANs or subnets with strict access controls to limit exposure to untrusted networks or users. 2. Access Controls: Restrict TFTP access to trusted hosts only, using firewall rules or access control lists to prevent unauthorized TFTP sessions. 3. Monitoring and Logging: Enable detailed logging of TFTP transactions and monitor for anomalous file transfer requests, especially those containing unusual filename patterns such as spaces. 4. Firmware Updates: Engage with Arris to obtain patches or firmware updates addressing this vulnerability as soon as they become available. 5. Physical Security: Ensure devices are physically secured to prevent unauthorized local network access or direct device manipulation. 6. Configuration Review: Audit device configurations to disable unnecessary TFTP services or restrict file transfer capabilities where possible. 7. Incident Response Preparedness: Develop and test incident response plans specific to device compromise scenarios involving firmware or configuration file tampering. 8. Vendor Communication: Maintain active communication channels with Arris for timely vulnerability disclosures and remediation guidance.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-06-02T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683e3aa0182aa0cae25b608f

Added to database: 6/2/2025, 11:58:24 PM

Last enriched: 7/11/2025, 7:33:41 AM

Last updated: 8/12/2025, 3:48:54 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats