CVE-2025-49162: CWE-424 Improper Protection of Alternate Path in Arris VIP1113
Arris VIP1113 devices through 2025-05-30 with KreaTV SDK allow file overwrite via TFTP because a remote filename with a space character allows an attacker to control the local filename.
AI Analysis
Technical Summary
CVE-2025-49162 is a vulnerability identified in the Arris VIP1113 device, which utilizes the KreaTV SDK. The issue arises due to improper protection of alternate file paths (CWE-424) during TFTP (Trivial File Transfer Protocol) operations. Specifically, the vulnerability allows an attacker to perform a file overwrite by exploiting the handling of remote filenames containing space characters. When a remote filename includes a space, the device's TFTP implementation incorrectly processes the filename, enabling the attacker to control the local filename used during the file transfer. This flaw can be leveraged to overwrite arbitrary files on the device's filesystem remotely without requiring authentication or user interaction. The vulnerability has a CVSS 3.1 base score of 6.4, indicating a medium severity level. The vector metrics show that the attack requires physical proximity or network access (Attack Vector: Physical), high attack complexity, no privileges required, no user interaction, and impacts confidentiality, integrity, and availability to a high degree. The vulnerability was published on June 2, 2025, and no known exploits have been reported in the wild yet. The absence of patches or mitigation links suggests that the vendor has not yet released an official fix. The root cause is the improper handling of alternate file paths during TFTP file transfers, which is a common protocol used for device configuration and firmware updates. Exploiting this vulnerability could allow attackers to overwrite critical system files, potentially leading to device compromise, denial of service, or persistent unauthorized access.
Potential Impact
For European organizations using Arris VIP1113 devices, particularly in sectors relying on these devices for IPTV or similar services, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized modification or destruction of device firmware or configuration files, resulting in service disruption or device bricking. Confidential data stored or processed by the device could be exposed or altered, impacting data integrity and confidentiality. Given the medium CVSS score but high impact on confidentiality, integrity, and availability, attackers could leverage this flaw to establish a foothold within internal networks, especially if these devices are connected to critical infrastructure or enterprise networks. The requirement for physical or local network access somewhat limits remote exploitation but does not eliminate risk, especially in environments where network segmentation is weak or where attackers have insider access. The lack of known exploits currently provides a window for proactive mitigation, but the vulnerability's nature suggests that once exploited, recovery could be complex and costly.
Mitigation Recommendations
1. Network Segmentation: Isolate Arris VIP1113 devices on dedicated VLANs or subnets with strict access controls to limit exposure to untrusted networks or users. 2. Access Controls: Restrict TFTP access to trusted hosts only, using firewall rules or access control lists to prevent unauthorized TFTP sessions. 3. Monitoring and Logging: Enable detailed logging of TFTP transactions and monitor for anomalous file transfer requests, especially those containing unusual filename patterns such as spaces. 4. Firmware Updates: Engage with Arris to obtain patches or firmware updates addressing this vulnerability as soon as they become available. 5. Physical Security: Ensure devices are physically secured to prevent unauthorized local network access or direct device manipulation. 6. Configuration Review: Audit device configurations to disable unnecessary TFTP services or restrict file transfer capabilities where possible. 7. Incident Response Preparedness: Develop and test incident response plans specific to device compromise scenarios involving firmware or configuration file tampering. 8. Vendor Communication: Maintain active communication channels with Arris for timely vulnerability disclosures and remediation guidance.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium
CVE-2025-49162: CWE-424 Improper Protection of Alternate Path in Arris VIP1113
Description
Arris VIP1113 devices through 2025-05-30 with KreaTV SDK allow file overwrite via TFTP because a remote filename with a space character allows an attacker to control the local filename.
AI-Powered Analysis
Technical Analysis
CVE-2025-49162 is a vulnerability identified in the Arris VIP1113 device, which utilizes the KreaTV SDK. The issue arises due to improper protection of alternate file paths (CWE-424) during TFTP (Trivial File Transfer Protocol) operations. Specifically, the vulnerability allows an attacker to perform a file overwrite by exploiting the handling of remote filenames containing space characters. When a remote filename includes a space, the device's TFTP implementation incorrectly processes the filename, enabling the attacker to control the local filename used during the file transfer. This flaw can be leveraged to overwrite arbitrary files on the device's filesystem remotely without requiring authentication or user interaction. The vulnerability has a CVSS 3.1 base score of 6.4, indicating a medium severity level. The vector metrics show that the attack requires physical proximity or network access (Attack Vector: Physical), high attack complexity, no privileges required, no user interaction, and impacts confidentiality, integrity, and availability to a high degree. The vulnerability was published on June 2, 2025, and no known exploits have been reported in the wild yet. The absence of patches or mitigation links suggests that the vendor has not yet released an official fix. The root cause is the improper handling of alternate file paths during TFTP file transfers, which is a common protocol used for device configuration and firmware updates. Exploiting this vulnerability could allow attackers to overwrite critical system files, potentially leading to device compromise, denial of service, or persistent unauthorized access.
Potential Impact
For European organizations using Arris VIP1113 devices, particularly in sectors relying on these devices for IPTV or similar services, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized modification or destruction of device firmware or configuration files, resulting in service disruption or device bricking. Confidential data stored or processed by the device could be exposed or altered, impacting data integrity and confidentiality. Given the medium CVSS score but high impact on confidentiality, integrity, and availability, attackers could leverage this flaw to establish a foothold within internal networks, especially if these devices are connected to critical infrastructure or enterprise networks. The requirement for physical or local network access somewhat limits remote exploitation but does not eliminate risk, especially in environments where network segmentation is weak or where attackers have insider access. The lack of known exploits currently provides a window for proactive mitigation, but the vulnerability's nature suggests that once exploited, recovery could be complex and costly.
Mitigation Recommendations
1. Network Segmentation: Isolate Arris VIP1113 devices on dedicated VLANs or subnets with strict access controls to limit exposure to untrusted networks or users. 2. Access Controls: Restrict TFTP access to trusted hosts only, using firewall rules or access control lists to prevent unauthorized TFTP sessions. 3. Monitoring and Logging: Enable detailed logging of TFTP transactions and monitor for anomalous file transfer requests, especially those containing unusual filename patterns such as spaces. 4. Firmware Updates: Engage with Arris to obtain patches or firmware updates addressing this vulnerability as soon as they become available. 5. Physical Security: Ensure devices are physically secured to prevent unauthorized local network access or direct device manipulation. 6. Configuration Review: Audit device configurations to disable unnecessary TFTP services or restrict file transfer capabilities where possible. 7. Incident Response Preparedness: Develop and test incident response plans specific to device compromise scenarios involving firmware or configuration file tampering. 8. Vendor Communication: Maintain active communication channels with Arris for timely vulnerability disclosures and remediation guidance.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-06-02T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683e3aa0182aa0cae25b608f
Added to database: 6/2/2025, 11:58:24 PM
Last enriched: 7/11/2025, 7:33:41 AM
Last updated: 11/21/2025, 1:43:35 AM
Views: 29
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13485: SQL Injection in itsourcecode Online File Management System
MediumCVE-2025-64660: CWE-284: Improper Access Control in Microsoft Visual Studio Code
MediumCVE-2025-64655: CWE-285: Improper Authorization in Microsoft Dynamics OmniChannel SDK Storage Containers
HighCVE-2025-62459: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Microsoft Microsoft 365 Defender Portal
HighCVE-2025-62207: CWE-918: Server-Side Request Forgery (SSRF) in Microsoft Azure Monitor Control Service
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.