CVE-2025-65287: n/a
An unauthenticated directory traversal vulnerability in cgi-bin/upload.cgi in SNMP Web Pro 1.1 allows a remote attacker to read arbitrary files. The CGI concatenates the user-supplied params directly onto the base path (/var/www/files/userScript/) using memcpy + strcat without validation or canonicalization, enabling ../ sequences to escape the intended directory. The download branch also echoes the unsanitized params into Content-Disposition, introducing header-injection risk.
AI Analysis
Technical Summary
CVE-2025-65287 is a critical security vulnerability found in SNMP Web Pro version 1.1, specifically within the cgi-bin/upload.cgi script. The vulnerability arises from insecure handling of user-supplied input parameters that are directly concatenated onto a fixed base directory path (/var/www/files/userScript/) using unsafe functions like memcpy and strcat without any validation or canonicalization. This lack of input sanitization allows an attacker to craft directory traversal payloads using '../' sequences to escape the intended directory and access arbitrary files on the server's filesystem. This can lead to unauthorized disclosure of sensitive information such as configuration files, credentials, or other protected data. Furthermore, the download functionality of the CGI script reflects these unsanitized parameters into the Content-Disposition HTTP header, creating an additional header injection vulnerability. This can be exploited to manipulate HTTP headers, potentially facilitating cross-site scripting (XSS), cache poisoning, or other HTTP response splitting attacks. The vulnerability is exploitable remotely without requiring any authentication or user interaction, increasing its risk profile. Although no CVSS score has been assigned yet and no patches are currently available, the vulnerability’s characteristics indicate a severe threat to confidentiality and integrity of affected systems. There are no known exploits in the wild at this time, but the simplicity of exploitation and the criticality of the impact warrant urgent attention from organizations using this software.
Potential Impact
For European organizations, exploitation of CVE-2025-65287 could lead to significant data breaches through unauthorized access to sensitive files stored on servers running SNMP Web Pro 1.1. This could include exposure of personal data protected under GDPR, intellectual property, or internal configuration files that might facilitate further attacks. The header injection aspect could enable attackers to manipulate HTTP responses, potentially leading to session hijacking or phishing attacks against users. The unauthenticated nature of the vulnerability means attackers can exploit it without any prior access, increasing the risk of widespread abuse. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely on SNMP Web Pro for network management or monitoring are particularly at risk. The lack of available patches and known exploits in the wild means organizations must proactively implement mitigations to reduce exposure. Failure to address this vulnerability could result in regulatory penalties, reputational damage, and operational disruption.
Mitigation Recommendations
Given the absence of official patches, European organizations should immediately implement compensating controls. First, restrict access to the vulnerable CGI script by limiting network exposure through firewall rules or network segmentation, allowing only trusted IP addresses to reach the affected endpoint. Disable or remove the cgi-bin/upload.cgi script if it is not essential for operations. Employ web application firewalls (WAFs) with custom rules to detect and block directory traversal patterns such as '../' sequences in URL parameters. Monitor web server logs for suspicious requests targeting upload.cgi and unusual file access patterns. Where possible, implement strict input validation and sanitization at the web server or proxy level to prevent malicious parameter injection. Conduct thorough audits of exposed files to identify any sensitive data that may have been accessed or exfiltrated. Prepare incident response plans to quickly address potential exploitation attempts. Finally, maintain close communication with the vendor for updates on patches or official remediation guidance.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2025-65287: n/a
Description
An unauthenticated directory traversal vulnerability in cgi-bin/upload.cgi in SNMP Web Pro 1.1 allows a remote attacker to read arbitrary files. The CGI concatenates the user-supplied params directly onto the base path (/var/www/files/userScript/) using memcpy + strcat without validation or canonicalization, enabling ../ sequences to escape the intended directory. The download branch also echoes the unsanitized params into Content-Disposition, introducing header-injection risk.
AI-Powered Analysis
Technical Analysis
CVE-2025-65287 is a critical security vulnerability found in SNMP Web Pro version 1.1, specifically within the cgi-bin/upload.cgi script. The vulnerability arises from insecure handling of user-supplied input parameters that are directly concatenated onto a fixed base directory path (/var/www/files/userScript/) using unsafe functions like memcpy and strcat without any validation or canonicalization. This lack of input sanitization allows an attacker to craft directory traversal payloads using '../' sequences to escape the intended directory and access arbitrary files on the server's filesystem. This can lead to unauthorized disclosure of sensitive information such as configuration files, credentials, or other protected data. Furthermore, the download functionality of the CGI script reflects these unsanitized parameters into the Content-Disposition HTTP header, creating an additional header injection vulnerability. This can be exploited to manipulate HTTP headers, potentially facilitating cross-site scripting (XSS), cache poisoning, or other HTTP response splitting attacks. The vulnerability is exploitable remotely without requiring any authentication or user interaction, increasing its risk profile. Although no CVSS score has been assigned yet and no patches are currently available, the vulnerability’s characteristics indicate a severe threat to confidentiality and integrity of affected systems. There are no known exploits in the wild at this time, but the simplicity of exploitation and the criticality of the impact warrant urgent attention from organizations using this software.
Potential Impact
For European organizations, exploitation of CVE-2025-65287 could lead to significant data breaches through unauthorized access to sensitive files stored on servers running SNMP Web Pro 1.1. This could include exposure of personal data protected under GDPR, intellectual property, or internal configuration files that might facilitate further attacks. The header injection aspect could enable attackers to manipulate HTTP responses, potentially leading to session hijacking or phishing attacks against users. The unauthenticated nature of the vulnerability means attackers can exploit it without any prior access, increasing the risk of widespread abuse. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely on SNMP Web Pro for network management or monitoring are particularly at risk. The lack of available patches and known exploits in the wild means organizations must proactively implement mitigations to reduce exposure. Failure to address this vulnerability could result in regulatory penalties, reputational damage, and operational disruption.
Mitigation Recommendations
Given the absence of official patches, European organizations should immediately implement compensating controls. First, restrict access to the vulnerable CGI script by limiting network exposure through firewall rules or network segmentation, allowing only trusted IP addresses to reach the affected endpoint. Disable or remove the cgi-bin/upload.cgi script if it is not essential for operations. Employ web application firewalls (WAFs) with custom rules to detect and block directory traversal patterns such as '../' sequences in URL parameters. Monitor web server logs for suspicious requests targeting upload.cgi and unusual file access patterns. Where possible, implement strict input validation and sanitization at the web server or proxy level to prevent malicious parameter injection. Conduct thorough audits of exposed files to identify any sensitive data that may have been accessed or exfiltrated. Prepare incident response plans to quickly address potential exploitation attempts. Finally, maintain close communication with the vendor for updates on patches or official remediation guidance.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-11-18T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 693843e8795dcaf6c50a72c8
Added to database: 12/9/2025, 3:44:40 PM
Last enriched: 12/9/2025, 3:56:40 PM
Last updated: 12/10/2025, 6:48:32 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13073: CWE-79 Cross-Site Scripting (XSS) in HandL UTM Grabber / Tracker
UnknownCVE-2025-13072: CWE-79 Cross-Site Scripting (XSS) in HandL UTM Grabber / Tracker
UnknownCVE-2025-13339: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in hippooo Hippoo Mobile App for WooCommerce
HighCVE-2025-67613
UnknownCVE-2025-67612
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.