The target device exposes a service on a specific TCP port with a configured endpoint. The access to that endpoint is granted using a Basic Authentication method. The endpoint accepts also the PUT method and it is possible to write files on the target device file system. Files are written as root. Using Postman it is possible to perform a Directory Traversal attack and write files into any location of the device file system. Similarly to the PUT method, it is possible to leverage the same mechanism to read any file from the file system by using the GET method.
History

Wed, 02 Jul 2025 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 02 Jul 2025 10:00:00 +0000

Type Values Removed Values Added
Description The target device exposes a service on a specific TCP port with a configured endpoint. The access to that endpoint is granted using a Basic Authentication method. The endpoint accepts also the PUT method and it is possible to write files on the target device file system. Files are written as root. Using Postman it is possible to perform a Directory Traversal attack and write files into any location of the device file system. Similarly to the PUT method, it is possible to leverage the same mechanism to read any file from the file system by using the GET method.
Title Improper File Access in Infinera G42
Weaknesses CWE-280
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: ENISA

Published: 2025-07-02T09:52:05.812Z

Updated: 2025-07-02T13:07:42.554Z

Reserved: 2025-02-18T06:59:55.889Z

Link: CVE-2025-27025

cve-icon Vulnrichment

Updated: 2025-07-02T13:06:41.865Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-02T10:15:22.880

Modified: 2025-07-03T15:13:53.147

Link: CVE-2025-27025

cve-icon Redhat

No data.