CVE-2025-41755

A low-privileged remote attacker can exploit the ubr-logread method in wwwubr.cgi to read arbitrary files on the system. The endpoint accepts a parameter specifying the log file to open (e.g., /tmp/weblog{some_number}), but this parameter is not properly validated, allowing an attacker to modify it to reference any file and retrieve its contents.
References
Link Resource
https://www.mbs-solutions.de/mbs-2025-0001 Vendor Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:mbs-solutions:universal_bacnet_router_firmware:*:*:*:*:*:*:*:*
OR cpe:2.3:h:mbs-solutions:ubr-01_mk_ii:-:*:*:*:*:*:*:*
cpe:2.3:h:mbs-solutions:ubr-02:-:*:*:*:*:*:*:*
cpe:2.3:h:mbs-solutions:ubr-lon:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-09 09:15

Updated : 2026-03-11 18:26


NVD link : CVE-2025-41755

Mitre link : CVE-2025-41755

CVE.ORG link : CVE-2025-41755


JSON object : View

Products Affected

mbs-solutions

  • ubr-lon
  • universal_bacnet_router_firmware
  • ubr-02
  • ubr-01_mk_ii
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')