Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65075: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in WaveStore WaveStore Server

0
Medium
VulnerabilityCVE-2025-65075cvecve-2025-65075cwe-22
Published: Tue Dec 16 2025 (12/16/2025, 12:25:17 UTC)
Source: CVE Database V5
Vendor/Project: WaveStore
Product: WaveStore Server

Description

WaveView client allows users to execute restricted set of predefined commands and scripts on the connected WaveStore Server. A malicious attacker with high-privileges is able to read or delete files, with the permissions of dvr user, on the server using path traversal in the alog script. This issue was fixed in version 6.44.44

AI-Powered Analysis

AILast updated: 12/16/2025, 12:55:12 UTC

Technical Analysis

CVE-2025-65075 is a path traversal vulnerability classified under CWE-22 found in the WaveStore Server product. The vulnerability exists in the WaveView client-server interaction, where the client can execute a restricted set of predefined commands and scripts on the connected WaveStore Server. Specifically, the 'alog' script does not properly sanitize or limit pathname inputs, allowing an attacker with high privileges on the server to perform path traversal attacks. This enables the attacker to read or delete arbitrary files on the server with the permissions of the 'dvr' user, which is the user context under which the WaveStore Server operates. The vulnerability does not require user interaction and can be exploited remotely over the network (AV:N), with low attack complexity (AC:L), and no authentication required beyond high privileges (PR:H). The impact on confidentiality and integrity is low to moderate, as the attacker can access or delete files but only with the 'dvr' user permissions, which may limit the scope of damage. Availability impact is none. The vulnerability was fixed in version 6.44.44 of WaveStore Server. No known exploits have been reported in the wild as of now. The CVSS v4.0 base score is 5.1, indicating a medium severity level. The vulnerability was assigned and published by CERT-PL in December 2025.

Potential Impact

For European organizations, the impact of CVE-2025-65075 depends largely on the deployment of WaveStore Server in their infrastructure. Organizations using WaveStore for video recording, surveillance, or DVR-related services could face unauthorized file access or deletion, potentially disrupting video data integrity or availability. Although exploitation requires high privileges, an attacker who has already compromised an account with elevated rights could leverage this vulnerability to escalate their access or cover tracks by deleting logs or critical files. This could impact sectors such as public safety, transportation, utilities, and private enterprises relying on video surveillance. The confidentiality of stored video data or configuration files could be compromised, and integrity affected by unauthorized deletions. However, the limited permissions of the 'dvr' user and absence of privilege escalation reduce the overall risk. The lack of known exploits in the wild lowers immediate threat but does not eliminate future risk. Organizations failing to update to the patched version remain vulnerable to potential targeted attacks.

Mitigation Recommendations

To mitigate CVE-2025-65075, European organizations should immediately upgrade WaveStore Server to version 6.44.44 or later, where the vulnerability is fixed. Restrict access to the WaveStore Server to only trusted administrators and limit the number of users with high privileges to reduce the attack surface. Implement strict access controls and monitoring on the 'dvr' user account to detect unusual file access or deletion activities. Employ network segmentation to isolate WaveStore Servers from untrusted networks and apply intrusion detection systems to monitor for suspicious command executions related to the 'alog' script. Regularly audit and review logs for signs of exploitation attempts. Additionally, consider application-layer filtering or input validation enhancements if custom scripts or integrations exist. Maintain up-to-date backups of critical video and configuration data to enable recovery in case of data deletion. Finally, educate system administrators about the vulnerability and the importance of applying patches promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
CERT-PL
Date Reserved
2025-11-17T09:20:09.473Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694154d05e006677ae0dd90b

Added to database: 12/16/2025, 12:47:12 PM

Last enriched: 12/16/2025, 12:55:12 PM

Last updated: 12/16/2025, 4:05:45 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats