Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65287: n/a

0
Unknown
VulnerabilityCVE-2025-65287cvecve-2025-65287
Published: Tue Dec 09 2025 (12/09/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An unauthenticated directory traversal vulnerability in cgi-bin/upload.cgi in SNMP Web Pro 1.1 allows a remote attacker to read arbitrary files. The CGI concatenates the user-supplied params directly onto the base path (/var/www/files/userScript/) using memcpy + strcat without validation or canonicalization, enabling ../ sequences to escape the intended directory. The download branch also echoes the unsanitized params into Content-Disposition, introducing header-injection risk.

AI-Powered Analysis

AILast updated: 12/09/2025, 15:56:40 UTC

Technical Analysis

CVE-2025-65287 is a critical security vulnerability found in SNMP Web Pro version 1.1, specifically within the cgi-bin/upload.cgi script. The vulnerability arises from insecure handling of user-supplied input parameters that are directly concatenated onto a fixed base directory path (/var/www/files/userScript/) using unsafe functions like memcpy and strcat without any validation or canonicalization. This lack of input sanitization allows an attacker to craft directory traversal payloads using '../' sequences to escape the intended directory and access arbitrary files on the server's filesystem. This can lead to unauthorized disclosure of sensitive information such as configuration files, credentials, or other protected data. Furthermore, the download functionality of the CGI script reflects these unsanitized parameters into the Content-Disposition HTTP header, creating an additional header injection vulnerability. This can be exploited to manipulate HTTP headers, potentially facilitating cross-site scripting (XSS), cache poisoning, or other HTTP response splitting attacks. The vulnerability is exploitable remotely without requiring any authentication or user interaction, increasing its risk profile. Although no CVSS score has been assigned yet and no patches are currently available, the vulnerability’s characteristics indicate a severe threat to confidentiality and integrity of affected systems. There are no known exploits in the wild at this time, but the simplicity of exploitation and the criticality of the impact warrant urgent attention from organizations using this software.

Potential Impact

For European organizations, exploitation of CVE-2025-65287 could lead to significant data breaches through unauthorized access to sensitive files stored on servers running SNMP Web Pro 1.1. This could include exposure of personal data protected under GDPR, intellectual property, or internal configuration files that might facilitate further attacks. The header injection aspect could enable attackers to manipulate HTTP responses, potentially leading to session hijacking or phishing attacks against users. The unauthenticated nature of the vulnerability means attackers can exploit it without any prior access, increasing the risk of widespread abuse. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely on SNMP Web Pro for network management or monitoring are particularly at risk. The lack of available patches and known exploits in the wild means organizations must proactively implement mitigations to reduce exposure. Failure to address this vulnerability could result in regulatory penalties, reputational damage, and operational disruption.

Mitigation Recommendations

Given the absence of official patches, European organizations should immediately implement compensating controls. First, restrict access to the vulnerable CGI script by limiting network exposure through firewall rules or network segmentation, allowing only trusted IP addresses to reach the affected endpoint. Disable or remove the cgi-bin/upload.cgi script if it is not essential for operations. Employ web application firewalls (WAFs) with custom rules to detect and block directory traversal patterns such as '../' sequences in URL parameters. Monitor web server logs for suspicious requests targeting upload.cgi and unusual file access patterns. Where possible, implement strict input validation and sanitization at the web server or proxy level to prevent malicious parameter injection. Conduct thorough audits of exposed files to identify any sensitive data that may have been accessed or exfiltrated. Prepare incident response plans to quickly address potential exploitation attempts. Finally, maintain close communication with the vendor for updates on patches or official remediation guidance.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693843e8795dcaf6c50a72c8

Added to database: 12/9/2025, 3:44:40 PM

Last enriched: 12/9/2025, 3:56:40 PM

Last updated: 12/10/2025, 6:48:32 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats