An unauthenticated directory traversal vulnerability in cgi-bin/upload.cgi in SNMP Web Pro 1.1 allows a remote attacker to read arbitrary files. The CGI concatenates the user-supplied params directly onto the base path (/var/www/files/userScript/) using memcpy + strcat without validation or canonicalization, enabling ../ sequences to escape the intended directory. The download branch also echoes the unsanitized params into Content-Disposition, introducing header-injection risk.
References
| Link | Resource |
|---|---|
| https://damiri.fr/en/cve/CVE-2025-65287 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-12-09 16:18
Updated : 2025-12-15 20:15
NVD link : CVE-2025-65287
Mitre link : CVE-2025-65287
CVE.ORG link : CVE-2025-65287
JSON object : View
Products Affected
cdpenergy
- snmp_web_pro
- snmp_web_pro_firmware
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
