Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64075: n/a

0
Critical
VulnerabilityCVE-2025-64075cvecve-2025-64075
Published: Wed Feb 11 2026 (02/11/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

A path traversal vulnerability in the check_token function of Shenzhen Zhibotong Electronics ZBT WE2001 23.09.27 allows remote attackers to bypass authentication and perform administrative actions by supplying a crafted session cookie value.

AI-Powered Analysis

AILast updated: 02/11/2026, 16:30:53 UTC

Technical Analysis

CVE-2025-64075 identifies a path traversal vulnerability within the check_token function of the Shenzhen Zhibotong Electronics ZBT WE2001 device firmware version 23.09.27. The vulnerability arises because the function improperly validates or sanitizes the session cookie input, allowing an attacker to craft a malicious cookie value that traverses the file system or bypasses authentication logic. By exploiting this flaw remotely, an attacker can bypass the authentication mechanism entirely and gain administrative privileges on the device. This unauthorized access enables the attacker to perform administrative actions such as configuration changes, firmware updates, or potentially deploying further malicious payloads. The vulnerability does not require prior authentication or user interaction, increasing its risk profile. Although no CVSS score has been assigned and no known exploits are currently reported, the nature of the vulnerability suggests a critical weakness in access control. The affected product is a network device likely used in embedded or IoT contexts, which may be deployed in enterprise or industrial environments. The lack of available patches or vendor advisories at this time necessitates immediate attention to detection and containment strategies.

Potential Impact

The impact of CVE-2025-64075 on European organizations can be significant, particularly for those relying on Shenzhen Zhibotong Electronics ZBT WE2001 devices or similar embedded network equipment. Unauthorized administrative access compromises device confidentiality, allowing attackers to view sensitive configuration data and credentials. Integrity is at risk as attackers can alter device settings, inject malicious firmware, or disrupt normal operations. Availability may be affected if attackers disable or destabilize the device. Such compromises can lead to broader network infiltration, data breaches, or disruption of critical services, especially in sectors like manufacturing, telecommunications, or smart infrastructure where these devices might be deployed. The absence of authentication requirements and the remote exploitability increase the likelihood of exploitation, potentially enabling widespread attacks if devices are exposed to untrusted networks. European organizations with limited visibility or control over embedded devices face heightened risks.

Mitigation Recommendations

1. Immediate network segmentation to isolate Shenzhen Zhibotong Electronics ZBT WE2001 devices from untrusted networks and limit administrative access to trusted personnel only. 2. Deploy strict firewall rules to restrict access to device management interfaces, ideally limiting to internal IP ranges or VPN connections. 3. Monitor network traffic for anomalous session cookie values or unusual administrative access patterns indicative of exploitation attempts. 4. Engage with the vendor to obtain firmware updates or patches addressing the vulnerability; if unavailable, consider device replacement or disabling vulnerable services. 5. Implement multi-factor authentication and strong credential policies where possible to add layers of defense. 6. Conduct regular vulnerability assessments and penetration testing focused on embedded devices to identify similar weaknesses. 7. Maintain an inventory of all Shenzhen Zhibotong Electronics devices to ensure comprehensive coverage of mitigation efforts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 698cab544b57a58fa1a4b9b6

Added to database: 2/11/2026, 4:16:20 PM

Last enriched: 2/11/2026, 4:30:53 PM

Last updated: 2/11/2026, 6:03:27 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats