CVE-2025-58152: Files or directories accessible to external parties in Century Systems Co., Ltd. FutureNet MA-X series
FutureNet MA and IP-K series provided by Century Systems Co., Ltd. put the firmware version and the garbage collection information on the internal web page. With some crafted HTTP request, they can be accessed without authentication.
AI Analysis
Technical Summary
CVE-2025-58152 is a vulnerability identified in Century Systems Co., Ltd.'s FutureNet MA-X series devices, specifically firmware versions from 6.0.0 to 6.4.1. The flaw resides in the device's internal web interface, which exposes sensitive information such as firmware version details and garbage collection data. These pages, intended for internal use, can be accessed externally without authentication by sending specially crafted HTTP requests. This unauthorized access allows attackers to gather information that could facilitate further exploitation or targeted attacks, such as identifying vulnerable firmware versions or understanding device behavior. The vulnerability does not permit modification of data or disruption of services, limiting its impact to confidentiality breaches. The CVSS v3.1 score of 5.3 indicates a medium severity, with an attack vector over the network, no privileges required, no user interaction needed, and impact limited to confidentiality. No public exploits have been reported yet, and no patches are currently linked, suggesting that organizations should monitor vendor advisories closely. The vulnerability was published on October 31, 2025, with the initial reservation on October 17, 2025, by JPCERT. This issue highlights the importance of securing device management interfaces and limiting external exposure of sensitive system information.
Potential Impact
For European organizations, the primary impact of CVE-2025-58152 is the unauthorized disclosure of sensitive device information, which can be leveraged by attackers during reconnaissance phases to identify vulnerable systems and plan more sophisticated attacks. While the vulnerability does not directly compromise system integrity or availability, the leakage of firmware version and garbage collection details can facilitate targeted exploitation of other vulnerabilities or social engineering attacks. Organizations in critical infrastructure sectors such as telecommunications, energy, and government that deploy Century Systems networking equipment may face increased risk. The exposure of device internals could also undermine compliance with data protection regulations if such information is considered sensitive. Additionally, attackers could use this information to fingerprint devices and map network topologies, increasing the attack surface. The absence of authentication requirements and the ability to exploit the vulnerability remotely over the network heighten the risk, especially if devices are accessible from untrusted networks.
Mitigation Recommendations
1. Immediately restrict external network access to the management interfaces of FutureNet MA-X series devices, ideally limiting access to trusted internal networks or via VPN. 2. Monitor network traffic for unusual HTTP requests targeting internal web pages that expose firmware or garbage collection information. 3. Implement strict firewall rules and access control lists (ACLs) to block unauthorized access attempts to device web interfaces. 4. Regularly check for and apply firmware updates or patches from Century Systems as they become available to address this vulnerability. 5. Conduct periodic security assessments and vulnerability scans on network devices to detect exposure of sensitive information. 6. Employ network segmentation to isolate critical devices and reduce exposure to external threats. 7. Educate IT and security teams about this vulnerability to ensure prompt detection and response. 8. Consider deploying web application firewalls (WAF) or intrusion detection/prevention systems (IDS/IPS) capable of identifying and blocking crafted HTTP requests targeting this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-58152: Files or directories accessible to external parties in Century Systems Co., Ltd. FutureNet MA-X series
Description
FutureNet MA and IP-K series provided by Century Systems Co., Ltd. put the firmware version and the garbage collection information on the internal web page. With some crafted HTTP request, they can be accessed without authentication.
AI-Powered Analysis
Technical Analysis
CVE-2025-58152 is a vulnerability identified in Century Systems Co., Ltd.'s FutureNet MA-X series devices, specifically firmware versions from 6.0.0 to 6.4.1. The flaw resides in the device's internal web interface, which exposes sensitive information such as firmware version details and garbage collection data. These pages, intended for internal use, can be accessed externally without authentication by sending specially crafted HTTP requests. This unauthorized access allows attackers to gather information that could facilitate further exploitation or targeted attacks, such as identifying vulnerable firmware versions or understanding device behavior. The vulnerability does not permit modification of data or disruption of services, limiting its impact to confidentiality breaches. The CVSS v3.1 score of 5.3 indicates a medium severity, with an attack vector over the network, no privileges required, no user interaction needed, and impact limited to confidentiality. No public exploits have been reported yet, and no patches are currently linked, suggesting that organizations should monitor vendor advisories closely. The vulnerability was published on October 31, 2025, with the initial reservation on October 17, 2025, by JPCERT. This issue highlights the importance of securing device management interfaces and limiting external exposure of sensitive system information.
Potential Impact
For European organizations, the primary impact of CVE-2025-58152 is the unauthorized disclosure of sensitive device information, which can be leveraged by attackers during reconnaissance phases to identify vulnerable systems and plan more sophisticated attacks. While the vulnerability does not directly compromise system integrity or availability, the leakage of firmware version and garbage collection details can facilitate targeted exploitation of other vulnerabilities or social engineering attacks. Organizations in critical infrastructure sectors such as telecommunications, energy, and government that deploy Century Systems networking equipment may face increased risk. The exposure of device internals could also undermine compliance with data protection regulations if such information is considered sensitive. Additionally, attackers could use this information to fingerprint devices and map network topologies, increasing the attack surface. The absence of authentication requirements and the ability to exploit the vulnerability remotely over the network heighten the risk, especially if devices are accessible from untrusted networks.
Mitigation Recommendations
1. Immediately restrict external network access to the management interfaces of FutureNet MA-X series devices, ideally limiting access to trusted internal networks or via VPN. 2. Monitor network traffic for unusual HTTP requests targeting internal web pages that expose firmware or garbage collection information. 3. Implement strict firewall rules and access control lists (ACLs) to block unauthorized access attempts to device web interfaces. 4. Regularly check for and apply firmware updates or patches from Century Systems as they become available to address this vulnerability. 5. Conduct periodic security assessments and vulnerability scans on network devices to detect exposure of sensitive information. 6. Employ network segmentation to isolate critical devices and reduce exposure to external threats. 7. Educate IT and security teams about this vulnerability to ensure prompt detection and response. 8. Consider deploying web application firewalls (WAF) or intrusion detection/prevention systems (IDS/IPS) capable of identifying and blocking crafted HTTP requests targeting this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- jpcert
- Date Reserved
- 2025-10-17T08:08:12.702Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6904523333ef7ec31273476f
Added to database: 10/31/2025, 6:07:47 AM
Last enriched: 10/31/2025, 6:08:18 AM
Last updated: 2/5/2026, 2:57:32 AM
Views: 104
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11730: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Zyxel ATP series firmware
HighCVE-2026-1898: Improper Access Controls in WeKan
MediumCVE-2026-1897: Missing Authorization in WeKan
MediumCVE-2026-1896: Improper Access Controls in WeKan
MediumCVE-2025-13192: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in roxnor Popup builder with Gamification, Multi-Step Popups, Page-Level Targeting, and WooCommerce Triggers
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.