Skip to main content

CVE-2025-6794: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Marvell QConvergeConsole

Critical
VulnerabilityCVE-2025-6794cvecve-2025-6794cwe-22
Published: Mon Jul 07 2025 (07/07/2025, 14:51:07 UTC)
Source: CVE Database V5
Vendor/Project: Marvell
Product: QConvergeConsole

Description

Marvell QConvergeConsole saveAsText Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Marvell QConvergeConsole. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the saveAsText method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-24913.

AI-Powered Analysis

AILast updated: 07/07/2025, 15:14:05 UTC

Technical Analysis

CVE-2025-6794 is a critical remote code execution vulnerability found in Marvell's QConvergeConsole product, specifically version 5.5.0.78. The vulnerability stems from improper validation of user-supplied file paths in the implementation of the saveAsText method, classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory, commonly known as a path traversal vulnerability). This flaw allows an unauthenticated remote attacker to craft malicious input that manipulates file path parameters, enabling them to traverse directories and execute arbitrary code with SYSTEM-level privileges on the affected system. The vulnerability does not require any authentication or user interaction, making it highly exploitable. The CVSS v3.0 base score is 9.8, indicating a critical severity with full impact on confidentiality, integrity, and availability. The vulnerability was assigned by ZDI (Zeroday Initiative) as ZDI-CAN-24913 and publicly disclosed on July 7, 2025. Although no public exploits have been reported in the wild yet, the nature of the vulnerability and its ease of exploitation make it a significant threat. The lack of patch information suggests that organizations using this specific version of QConvergeConsole should urgently seek vendor updates or apply mitigations to prevent exploitation. QConvergeConsole is typically used in network management and monitoring contexts, often deployed in enterprise and service provider environments, which increases the potential impact of this vulnerability if exploited.

Potential Impact

For European organizations, the impact of CVE-2025-6794 could be severe. Since the vulnerability allows unauthenticated remote code execution with SYSTEM privileges, attackers could gain full control over affected systems, leading to data breaches, disruption of network management operations, and potential lateral movement within corporate networks. This could compromise sensitive data, disrupt critical infrastructure, and damage organizational reputation. Given that QConvergeConsole is used in network device management, exploitation could also affect the availability and integrity of network configurations, potentially causing widespread outages or degraded service performance. The critical nature of this vulnerability means that European entities in sectors such as telecommunications, finance, government, and critical infrastructure—where network management tools like QConvergeConsole are commonly deployed—are at heightened risk. Additionally, the lack of authentication requirement lowers the barrier for attackers, increasing the likelihood of targeted or opportunistic attacks within Europe.

Mitigation Recommendations

1. Immediate action should include identifying all instances of Marvell QConvergeConsole version 5.5.0.78 within the network. 2. Contact Marvell for official patches or security advisories; apply any available updates promptly. 3. If patches are not yet available, implement network-level access controls to restrict access to QConvergeConsole management interfaces, limiting exposure to trusted IP addresses only. 4. Employ web application firewalls (WAFs) or intrusion prevention systems (IPS) with custom rules to detect and block path traversal attempts targeting the saveAsText method. 5. Monitor logs for suspicious file path inputs or unusual activity related to QConvergeConsole. 6. Consider isolating QConvergeConsole servers in segmented network zones with strict access policies. 7. Conduct regular security assessments and penetration tests focusing on management consoles to detect similar vulnerabilities. 8. Educate IT and security teams about this vulnerability to ensure rapid incident response if exploitation attempts are detected.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2025-06-27T14:57:17.533Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 686bdfa06f40f0eb72ea12a6

Added to database: 7/7/2025, 2:54:24 PM

Last enriched: 7/7/2025, 3:14:05 PM

Last updated: 8/15/2025, 2:54:34 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats