CVE-2025-49162: CWE-424 Improper Protection of Alternate Path in Arris VIP1113
Arris VIP1113 devices through 2025-05-30 with KreaTV SDK allow file overwrite via TFTP because a remote filename with a space character allows an attacker to control the local filename.
AI Analysis
Technical Summary
CVE-2025-49162 is a vulnerability identified in the Arris VIP1113 device, which utilizes the KreaTV SDK. The issue arises due to improper protection of alternate file paths (CWE-424) during TFTP (Trivial File Transfer Protocol) operations. Specifically, the vulnerability allows an attacker to perform a file overwrite by exploiting the handling of remote filenames containing space characters. When a remote filename includes a space, the device's TFTP implementation incorrectly processes the filename, enabling the attacker to control the local filename used during the file transfer. This flaw can be leveraged to overwrite arbitrary files on the device's filesystem remotely without requiring authentication or user interaction. The vulnerability has a CVSS 3.1 base score of 6.4, indicating a medium severity level. The vector metrics show that the attack requires physical proximity or network access (Attack Vector: Physical), high attack complexity, no privileges required, no user interaction, and impacts confidentiality, integrity, and availability to a high degree. The vulnerability was published on June 2, 2025, and no known exploits have been reported in the wild yet. The absence of patches or mitigation links suggests that the vendor has not yet released an official fix. The root cause is the improper handling of alternate file paths during TFTP file transfers, which is a common protocol used for device configuration and firmware updates. Exploiting this vulnerability could allow attackers to overwrite critical system files, potentially leading to device compromise, denial of service, or persistent unauthorized access.
Potential Impact
For European organizations using Arris VIP1113 devices, particularly in sectors relying on these devices for IPTV or similar services, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized modification or destruction of device firmware or configuration files, resulting in service disruption or device bricking. Confidential data stored or processed by the device could be exposed or altered, impacting data integrity and confidentiality. Given the medium CVSS score but high impact on confidentiality, integrity, and availability, attackers could leverage this flaw to establish a foothold within internal networks, especially if these devices are connected to critical infrastructure or enterprise networks. The requirement for physical or local network access somewhat limits remote exploitation but does not eliminate risk, especially in environments where network segmentation is weak or where attackers have insider access. The lack of known exploits currently provides a window for proactive mitigation, but the vulnerability's nature suggests that once exploited, recovery could be complex and costly.
Mitigation Recommendations
1. Network Segmentation: Isolate Arris VIP1113 devices on dedicated VLANs or subnets with strict access controls to limit exposure to untrusted networks or users. 2. Access Controls: Restrict TFTP access to trusted hosts only, using firewall rules or access control lists to prevent unauthorized TFTP sessions. 3. Monitoring and Logging: Enable detailed logging of TFTP transactions and monitor for anomalous file transfer requests, especially those containing unusual filename patterns such as spaces. 4. Firmware Updates: Engage with Arris to obtain patches or firmware updates addressing this vulnerability as soon as they become available. 5. Physical Security: Ensure devices are physically secured to prevent unauthorized local network access or direct device manipulation. 6. Configuration Review: Audit device configurations to disable unnecessary TFTP services or restrict file transfer capabilities where possible. 7. Incident Response Preparedness: Develop and test incident response plans specific to device compromise scenarios involving firmware or configuration file tampering. 8. Vendor Communication: Maintain active communication channels with Arris for timely vulnerability disclosures and remediation guidance.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium
CVE-2025-49162: CWE-424 Improper Protection of Alternate Path in Arris VIP1113
Description
Arris VIP1113 devices through 2025-05-30 with KreaTV SDK allow file overwrite via TFTP because a remote filename with a space character allows an attacker to control the local filename.
AI-Powered Analysis
Technical Analysis
CVE-2025-49162 is a vulnerability identified in the Arris VIP1113 device, which utilizes the KreaTV SDK. The issue arises due to improper protection of alternate file paths (CWE-424) during TFTP (Trivial File Transfer Protocol) operations. Specifically, the vulnerability allows an attacker to perform a file overwrite by exploiting the handling of remote filenames containing space characters. When a remote filename includes a space, the device's TFTP implementation incorrectly processes the filename, enabling the attacker to control the local filename used during the file transfer. This flaw can be leveraged to overwrite arbitrary files on the device's filesystem remotely without requiring authentication or user interaction. The vulnerability has a CVSS 3.1 base score of 6.4, indicating a medium severity level. The vector metrics show that the attack requires physical proximity or network access (Attack Vector: Physical), high attack complexity, no privileges required, no user interaction, and impacts confidentiality, integrity, and availability to a high degree. The vulnerability was published on June 2, 2025, and no known exploits have been reported in the wild yet. The absence of patches or mitigation links suggests that the vendor has not yet released an official fix. The root cause is the improper handling of alternate file paths during TFTP file transfers, which is a common protocol used for device configuration and firmware updates. Exploiting this vulnerability could allow attackers to overwrite critical system files, potentially leading to device compromise, denial of service, or persistent unauthorized access.
Potential Impact
For European organizations using Arris VIP1113 devices, particularly in sectors relying on these devices for IPTV or similar services, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized modification or destruction of device firmware or configuration files, resulting in service disruption or device bricking. Confidential data stored or processed by the device could be exposed or altered, impacting data integrity and confidentiality. Given the medium CVSS score but high impact on confidentiality, integrity, and availability, attackers could leverage this flaw to establish a foothold within internal networks, especially if these devices are connected to critical infrastructure or enterprise networks. The requirement for physical or local network access somewhat limits remote exploitation but does not eliminate risk, especially in environments where network segmentation is weak or where attackers have insider access. The lack of known exploits currently provides a window for proactive mitigation, but the vulnerability's nature suggests that once exploited, recovery could be complex and costly.
Mitigation Recommendations
1. Network Segmentation: Isolate Arris VIP1113 devices on dedicated VLANs or subnets with strict access controls to limit exposure to untrusted networks or users. 2. Access Controls: Restrict TFTP access to trusted hosts only, using firewall rules or access control lists to prevent unauthorized TFTP sessions. 3. Monitoring and Logging: Enable detailed logging of TFTP transactions and monitor for anomalous file transfer requests, especially those containing unusual filename patterns such as spaces. 4. Firmware Updates: Engage with Arris to obtain patches or firmware updates addressing this vulnerability as soon as they become available. 5. Physical Security: Ensure devices are physically secured to prevent unauthorized local network access or direct device manipulation. 6. Configuration Review: Audit device configurations to disable unnecessary TFTP services or restrict file transfer capabilities where possible. 7. Incident Response Preparedness: Develop and test incident response plans specific to device compromise scenarios involving firmware or configuration file tampering. 8. Vendor Communication: Maintain active communication channels with Arris for timely vulnerability disclosures and remediation guidance.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-06-02T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683e3aa0182aa0cae25b608f
Added to database: 6/2/2025, 11:58:24 PM
Last enriched: 7/11/2025, 7:33:41 AM
Last updated: 8/12/2025, 3:48:54 AM
Views: 9
Related Threats
CVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumCVE-2025-8143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencidesign Soledad
MediumCVE-2025-8142: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in pencidesign Soledad
HighCVE-2025-8105: CWE-94 Improper Control of Generation of Code ('Code Injection') in pencidesign Soledad
HighCVE-2025-8719: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in reubenthiessen Translate This gTranslate Shortcode
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.