CVE-2025-41717

unauthenticated · unauthenticated Multiple Products

A critical vulnerability has been identified that allows an unauthenticated remote attacker to gain full control of affected systems.

Executive summary

A critical vulnerability has been identified that allows an unauthenticated remote attacker to gain full control of affected systems. By tricking a privileged administrator into uploading a specially crafted configuration file, an attacker can execute malicious code with the highest system privileges (root), leading to a complete compromise of the system's confidentiality, integrity, and availability.

Vulnerability

This vulnerability is a code injection flaw within the configuration upload functionality. The attack requires user interaction. An unauthenticated attacker first creates a malicious configuration file containing a payload, such as embedded shell commands. The attacker then uses social engineering techniques (e.g., a phishing email) to convince an authenticated user with high privileges to upload this malicious file via the config-upload endpoint. The application fails to properly sanitize the contents of the uploaded file before processing it, causing the embedded malicious code to be executed with root-level permissions on the underlying operating system.

Business impact

This vulnerability is rated as High severity with a CVSS score of 8.8. Successful exploitation would result in a complete system compromise, granting the attacker full administrative control. The potential business impact is severe and includes theft of sensitive data, deployment of ransomware, disruption of critical services, and the ability for the attacker to use the compromised system as a pivot point to attack other internal network resources. This poses a significant risk to operational continuity, data security, and brand reputation.

Remediation

Immediate Action: The primary remediation is to apply the security updates provided by the vendor across all affected products without delay. After patching, review system and application logs for any signs of compromise, specifically focusing on unusual activity related to the config-upload endpoint.

Proactive Monitoring: Implement enhanced monitoring to detect potential exploitation attempts. Security teams should look for:

  • Unusual or unexpected POST requests to the config-upload endpoint in web server access logs.
  • The creation of suspicious files or unexpected outbound network connections from affected systems.
  • The execution of new or unauthorized processes, especially those running with root privileges.
  • Alerts from endpoint detection and response (EDR) solutions indicating shell command execution by the application process.

Compensating Controls: If immediate patching is not feasible, implement the following compensating controls to reduce the risk of exploitation:

  • Restrict network access to the device's management interface to a dedicated and trusted management network.
  • Implement a Web Application Firewall (WAF) with rules to inspect and block malicious or malformed configuration uploads.
  • Reinforce security awareness training for all privileged users, specifically focusing on the dangers of phishing and downloading/uploading files from untrusted sources.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the high CVSS score of 8.8 and the potential for a full system compromise, this vulnerability poses a critical risk to the organization. Although it is not currently listed on the CISA KEV list, we strongly recommend that all affected systems are patched on an emergency basis. If patching cannot be immediately deployed, the compensating controls listed above, particularly restricting access to the management interface, should be implemented as a matter of urgency to mitigate the immediate threat.