Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58152: Files or directories accessible to external parties in Century Systems Co., Ltd. FutureNet MA-X series

0
Medium
VulnerabilityCVE-2025-58152cvecve-2025-58152
Published: Fri Oct 31 2025 (10/31/2025, 05:55:02 UTC)
Source: CVE Database V5
Vendor/Project: Century Systems Co., Ltd.
Product: FutureNet MA-X series

Description

FutureNet MA and IP-K series provided by Century Systems Co., Ltd. put the firmware version and the garbage collection information on the internal web page. With some crafted HTTP request, they can be accessed without authentication.

AI-Powered Analysis

AILast updated: 10/31/2025, 06:08:18 UTC

Technical Analysis

CVE-2025-58152 is a vulnerability identified in Century Systems Co., Ltd.'s FutureNet MA-X series devices, specifically firmware versions from 6.0.0 to 6.4.1. The flaw resides in the device's internal web interface, which exposes sensitive information such as firmware version details and garbage collection data. These pages, intended for internal use, can be accessed externally without authentication by sending specially crafted HTTP requests. This unauthorized access allows attackers to gather information that could facilitate further exploitation or targeted attacks, such as identifying vulnerable firmware versions or understanding device behavior. The vulnerability does not permit modification of data or disruption of services, limiting its impact to confidentiality breaches. The CVSS v3.1 score of 5.3 indicates a medium severity, with an attack vector over the network, no privileges required, no user interaction needed, and impact limited to confidentiality. No public exploits have been reported yet, and no patches are currently linked, suggesting that organizations should monitor vendor advisories closely. The vulnerability was published on October 31, 2025, with the initial reservation on October 17, 2025, by JPCERT. This issue highlights the importance of securing device management interfaces and limiting external exposure of sensitive system information.

Potential Impact

For European organizations, the primary impact of CVE-2025-58152 is the unauthorized disclosure of sensitive device information, which can be leveraged by attackers during reconnaissance phases to identify vulnerable systems and plan more sophisticated attacks. While the vulnerability does not directly compromise system integrity or availability, the leakage of firmware version and garbage collection details can facilitate targeted exploitation of other vulnerabilities or social engineering attacks. Organizations in critical infrastructure sectors such as telecommunications, energy, and government that deploy Century Systems networking equipment may face increased risk. The exposure of device internals could also undermine compliance with data protection regulations if such information is considered sensitive. Additionally, attackers could use this information to fingerprint devices and map network topologies, increasing the attack surface. The absence of authentication requirements and the ability to exploit the vulnerability remotely over the network heighten the risk, especially if devices are accessible from untrusted networks.

Mitigation Recommendations

1. Immediately restrict external network access to the management interfaces of FutureNet MA-X series devices, ideally limiting access to trusted internal networks or via VPN. 2. Monitor network traffic for unusual HTTP requests targeting internal web pages that expose firmware or garbage collection information. 3. Implement strict firewall rules and access control lists (ACLs) to block unauthorized access attempts to device web interfaces. 4. Regularly check for and apply firmware updates or patches from Century Systems as they become available to address this vulnerability. 5. Conduct periodic security assessments and vulnerability scans on network devices to detect exposure of sensitive information. 6. Employ network segmentation to isolate critical devices and reduce exposure to external threats. 7. Educate IT and security teams about this vulnerability to ensure prompt detection and response. 8. Consider deploying web application firewalls (WAF) or intrusion detection/prevention systems (IDS/IPS) capable of identifying and blocking crafted HTTP requests targeting this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
jpcert
Date Reserved
2025-10-17T08:08:12.702Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6904523333ef7ec31273476f

Added to database: 10/31/2025, 6:07:47 AM

Last enriched: 10/31/2025, 6:08:18 AM

Last updated: 10/31/2025, 9:58:33 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats