An authenticated, read-only user can upload a file and perform a directory traversal to have the uploaded file placed in a location of their choosing. This can be used to overwrite existing PERL modules within the application to achieve remote code execution (RCE) by an attacker.
Metrics
Affected Vendors & Products
References
History
Tue, 29 Jul 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Tue, 29 Jul 2025 08:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Xorux
Xorux lpar2rrd |
|
Vendors & Products |
Xorux
Xorux lpar2rrd |
Mon, 28 Jul 2025 23:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An authenticated, read-only user can upload a file and perform a directory traversal to have the uploaded file placed in a location of their choosing. This can be used to overwrite existing PERL modules within the application to achieve remote code execution (RCE) by an attacker. | |
Title | KL-001-2025-016: Xorux LPAR2RRD File Upload Directory Traversal | |
Weaknesses | CWE-24 CWE-434 CWE-648 |
|
References |
|

Status: PUBLISHED
Assigner: KoreLogic
Published: 2025-07-28T23:34:38.972Z
Updated: 2025-07-29T13:22:11.335Z
Reserved: 2025-07-28T16:02:18.186Z
Link: CVE-2025-54769

Updated: 2025-07-29T13:20:57.115Z

Status : Awaiting Analysis
Published: 2025-07-29T00:15:24.473
Modified: 2025-07-29T14:15:38.010
Link: CVE-2025-54769

No data.