CVE-2025-41756
Unknown (Web-Enabled Controller) · wwwubr Service
A vulnerability in the ubr-editfile method of the wwwubr service allows low-privileged remote attackers to perform unauthorized file manipulations.
Executive summary
Low-privileged remote attackers can exploit the ubr-editfile method to gain unauthorized access to and modify critical system files on the device.
Vulnerability
The ubr-editfile method within the wwwubr service contains a flaw that allows a remote attacker with low-privileged credentials to interact with the filesystem in ways that should be restricted to administrators.
Business impact
The ability to edit system files can lead to the disabling of security features, the creation of backdoor accounts, or the theft of sensitive configuration data. The CVSS score of 8.1 reflects a high severity, as it facilitates significant privilege escalation and persistent access within the device's operating environment.
Remediation
Immediate Action: Update the device firmware immediately to the latest version to restrict access to the ubr-editfile method to authorized administrative accounts only.
Proactive Monitoring: Audit system configuration files for unauthorized changes and monitor access logs for any use of the ubr-editfile method by non-administrative users.
Compensating Controls: Implement strict role-based access control (RBAC) and ensure that the management interface is only accessible from a dedicated, secure management VLAN.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Organizations should treat any vulnerability allowing unauthorized file modification as a critical threat. Immediate patching is the only effective mitigation to prevent low-privileged users from compromising the entire device.