CVE-2025-14199

A flaw has been found in Verysync 微力同步 up to 2.21.3. This impacts an unknown function of the file /rest/f/api/resources/f96956469e7be39d/tmp/text.txt?override=false of the component Web Administration Module. Executing manipulation can lead to unrestricted upload. The attack may be performed from remote. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://github.com/jjjjj-zr/jjjjjzr/issues/10 Exploit Issue Tracking Third Party Advisory
https://vuldb.com/?ctiid.334619 Permissions Required VDB Entry
https://vuldb.com/?id.334619 Third Party Advisory VDB Entry
https://vuldb.com/?submit.699539 Third Party Advisory VDB Entry
https://github.com/jjjjj-zr/jjjjjzr/issues/10 Exploit Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:verysync:verysync:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-12-07 17:15

Updated : 2025-12-11 18:07


NVD link : CVE-2025-14199

Mitre link : CVE-2025-14199

CVE.ORG link : CVE-2025-14199


JSON object : View

Products Affected

verysync

  • verysync
CWE
CWE-284

Improper Access Control

CWE-434

Unrestricted Upload of File with Dangerous Type