Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65075: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in WaveStore WaveStore Server

0
Medium
VulnerabilityCVE-2025-65075cvecve-2025-65075cwe-22
Published: Tue Dec 16 2025 (12/16/2025, 12:25:17 UTC)
Source: CVE Database V5
Vendor/Project: WaveStore
Product: WaveStore Server

Description

WaveView client allows users to execute restricted set of predefined commands and scripts on the connected WaveStore Server. A malicious attacker with high-privileges is able to read or delete files, with the permissions of dvr user, on the server using path traversal in the alog script. This issue was fixed in version 6.44.44

AI-Powered Analysis

AILast updated: 12/23/2025, 13:26:44 UTC

Technical Analysis

CVE-2025-65075 is a path traversal vulnerability classified under CWE-22 found in the WaveStore Server product. The vulnerability exists because the WaveView client allows execution of a limited set of predefined commands and scripts on the connected WaveStore Server, specifically through the 'alog' script. However, the input to this script is not properly sanitized or restricted, enabling an attacker with high privileges on the system to manipulate the pathname and traverse directories outside the intended restricted directory. This allows the attacker to read or delete arbitrary files on the server with the permissions of the 'dvr' user, which is the user context under which the server operates. The vulnerability does not require user interaction and can be exploited remotely over the network, but it does require the attacker to already have high privileges on the system, limiting the initial attack vector. The CVSS v4.0 score is 5.1 (medium severity), reflecting the moderate impact on confidentiality and integrity, with no impact on availability. The vulnerability affects all versions prior to 6.44.44, where the issue has been fixed. No public exploits or active exploitation have been reported to date. The vulnerability highlights the risk of insufficient input validation and improper restriction of file system paths in server-side scripts, which can lead to unauthorized file system access and potential data compromise or deletion.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to unauthorized disclosure or deletion of sensitive files on WaveStore Server systems, potentially disrupting video recording or surveillance data integrity if used in security or monitoring contexts. Since the attacker must have high privileges, the vulnerability primarily elevates the impact of insider threats or lateral movement after initial compromise. Confidentiality and integrity of data managed by the WaveStore Server could be compromised, affecting compliance with data protection regulations such as GDPR if personal or sensitive data is involved. Operational disruption could occur if critical files are deleted, impacting business continuity. Organizations relying on WaveStore Server for video storage or related services in sectors like public safety, transportation, or critical infrastructure may face increased risk. The lack of known exploits reduces immediate threat but patching remains essential to prevent future attacks, especially in environments with multiple users or complex access controls.

Mitigation Recommendations

Organizations should immediately upgrade WaveStore Server installations to version 6.44.44 or later where the vulnerability is fixed. Until patching is possible, restrict access to the WaveView client and WaveStore Server to trusted administrators only, minimizing the number of users with high privileges. Implement strict access controls and monitoring on the 'dvr' user account and related file system permissions to detect and prevent unauthorized file access or deletion. Employ network segmentation and firewall rules to limit exposure of WaveStore Server to untrusted networks. Conduct regular audits of server logs to identify suspicious command executions or file operations related to the alog script. Additionally, review and harden input validation mechanisms in custom scripts or integrations with WaveStore Server to prevent similar path traversal issues. Incorporate these controls into incident response plans to quickly address any signs of exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
CERT-PL
Date Reserved
2025-11-17T09:20:09.473Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694154d05e006677ae0dd90b

Added to database: 12/16/2025, 12:47:12 PM

Last enriched: 12/23/2025, 1:26:44 PM

Last updated: 2/5/2026, 11:31:14 PM

Views: 77

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats