The target device exposes a service on a specific TCP port with a configured
endpoint. The access to that endpoint is granted using a Basic Authentication
method. The endpoint accepts also the PUT method and it is possible to
write files on the target device file system. Files are written as root.
Using Postman it is possible to perform a Directory Traversal attack
and write files into any location of the device file system. Similarly to the PUT method, it is possible to leverage the
same mechanism to read any file from the file system by using the GET
method.
Metrics
Affected Vendors & Products
References
History
Wed, 02 Jul 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 02 Jul 2025 10:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The target device exposes a service on a specific TCP port with a configured endpoint. The access to that endpoint is granted using a Basic Authentication method. The endpoint accepts also the PUT method and it is possible to write files on the target device file system. Files are written as root. Using Postman it is possible to perform a Directory Traversal attack and write files into any location of the device file system. Similarly to the PUT method, it is possible to leverage the same mechanism to read any file from the file system by using the GET method. | |
Title | Improper File Access in Infinera G42 | |
Weaknesses | CWE-280 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: ENISA
Published: 2025-07-02T09:52:05.812Z
Updated: 2025-07-02T13:07:42.554Z
Reserved: 2025-02-18T06:59:55.889Z
Link: CVE-2025-27025

Updated: 2025-07-02T13:06:41.865Z

Status : Awaiting Analysis
Published: 2025-07-02T10:15:22.880
Modified: 2025-07-03T15:13:53.147
Link: CVE-2025-27025

No data.