Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67115: n/a

0
Medium
VulnerabilityCVE-2025-67115cvecve-2025-67115
Published: Thu Mar 19 2026 (03/19/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

A path traversal vulnerability in /ftl/web/setup.cgi in Small Cell Sercomm SCE4255W (FreedomFi Englewood) firmware before DG3934v3@2308041842 allows remote authenticated users to read arbitrary files from the filesystem via crafted values in the log_type parameter to /logsave.htm.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 19:12:18 UTC

Technical Analysis

CVE-2025-67115 is a path traversal vulnerability identified in the Small Cell Sercomm SCE4255W device, specifically in the firmware versions prior to DG3934v3@2308041842. The flaw exists in the /ftl/web/setup.cgi component, where the log_type parameter in the /logsave.htm endpoint is improperly sanitized. This allows a remote attacker with valid authentication credentials to craft malicious input that traverses the filesystem directory structure, enabling them to read arbitrary files outside the intended directory scope. The vulnerability is classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory). The attack vector is network-based (AV:N), requires low attack complexity (AC:L), and requires privileges (PR:L) but no user interaction (UI:N). The impact is high on confidentiality (C:H) but does not affect integrity or availability. Although no public exploits have been reported yet, the vulnerability poses a significant risk due to the sensitive nature of files that could be exposed, including configuration files, credentials, or logs. The affected device is commonly used in small cell deployments to extend cellular coverage, often integrated into FreedomFi networks, which are gaining traction in various regions. The lack of a patch link suggests that a fix may be pending or in development, emphasizing the need for vigilance and interim protective measures.

Potential Impact

The primary impact of this vulnerability is unauthorized disclosure of sensitive information stored on the affected device. Attackers who successfully exploit this flaw can access configuration files, credentials, or other sensitive data that could facilitate further attacks, such as privilege escalation or network infiltration. Since the device is used in cellular small cell infrastructure, compromise could affect network reliability and user privacy. Organizations deploying these devices risk exposure of internal network details and potentially customer data. Although the vulnerability does not allow code execution or denial of service, the confidentiality breach alone can have serious consequences, including regulatory compliance violations and erosion of trust. The requirement for authentication limits the attack surface but does not eliminate risk, especially in environments where credentials may be weak, reused, or compromised. The absence of known exploits in the wild currently reduces immediate risk but does not preclude future exploitation. Overall, the vulnerability could undermine the security posture of cellular network providers and enterprises relying on these devices for coverage extension.

Mitigation Recommendations

1. Immediately verify the firmware version of all Small Cell Sercomm SCE4255W devices and plan to upgrade to DG3934v3@2308041842 or later once the patch is officially released. 2. Restrict access to device management interfaces (including /logsave.htm and /ftl/web/setup.cgi) to trusted networks and authorized personnel only, using network segmentation and firewall rules. 3. Enforce strong authentication mechanisms, including unique, complex passwords and multi-factor authentication where supported, to reduce the risk of credential compromise. 4. Monitor device logs and network traffic for unusual access patterns or attempts to exploit path traversal vulnerabilities. 5. If patching is delayed, consider deploying web application firewalls (WAFs) or intrusion prevention systems (IPS) with custom rules to detect and block suspicious log_type parameter values indicative of path traversal attempts. 6. Conduct regular security audits and vulnerability assessments on network infrastructure devices to identify and remediate similar issues proactively. 7. Educate administrators about the risks of path traversal vulnerabilities and the importance of timely patching and access control.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-12-08T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69bc34d3e32a4fbe5fe2fcb1

Added to database: 3/19/2026, 5:39:31 PM

Last enriched: 3/26/2026, 7:12:18 PM

Last updated: 5/2/2026, 1:36:28 PM

Views: 79

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses