CVE-2025-41756

Unknown (Web-Enabled Controller) · wwwubr Service

A vulnerability in the ubr-editfile method of the wwwubr service allows low-privileged remote attackers to perform unauthorized file manipulations.

Executive summary

Low-privileged remote attackers can exploit the ubr-editfile method to gain unauthorized access to and modify critical system files on the device.

Vulnerability

The ubr-editfile method within the wwwubr service contains a flaw that allows a remote attacker with low-privileged credentials to interact with the filesystem in ways that should be restricted to administrators.

Business impact

The ability to edit system files can lead to the disabling of security features, the creation of backdoor accounts, or the theft of sensitive configuration data. The CVSS score of 8.1 reflects a high severity, as it facilitates significant privilege escalation and persistent access within the device's operating environment.

Remediation

Immediate Action: Update the device firmware immediately to the latest version to restrict access to the ubr-editfile method to authorized administrative accounts only.

Proactive Monitoring: Audit system configuration files for unauthorized changes and monitor access logs for any use of the ubr-editfile method by non-administrative users.

Compensating Controls: Implement strict role-based access control (RBAC) and ensure that the management interface is only accessible from a dedicated, secure management VLAN.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Organizations should treat any vulnerability allowing unauthorized file modification as a critical threat. Immediate patching is the only effective mitigation to prevent low-privileged users from compromising the entire device.