CVE-2019-25351
Received Received - Intake
Arbitrary File Download in Centova Cast 3.2.11 via API

Publication date: 2026-02-18

Last updated on: 2026-02-18

Assigner: VulnCheck

Description
Centova Cast 3.2.11 contains a file download vulnerability that allows authenticated attackers to retrieve arbitrary system files through the server.copyfile API endpoint. Attackers can exploit the vulnerability by supplying crafted parameters to download sensitive files like /etc/passwd using curl and wget requests.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-18
Last Modified
2026-02-18
Generated
2026-05-07
AI Q&A
2026-02-19
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
centova cast 3.2.11
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in Centova Cast version 3.2.11 and involves a file download flaw. Authenticated attackers can exploit the server.copyfile API endpoint by supplying specially crafted parameters to download arbitrary system files. For example, attackers can retrieve sensitive files such as /etc/passwd by using tools like curl or wget.


How can this vulnerability impact me? :

The vulnerability allows attackers with authentication to access sensitive system files that should normally be protected. This can lead to unauthorized disclosure of critical information, potentially enabling further attacks or system compromise.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by attempting to exploit the file download flaw on the server.copyfile API endpoint using crafted requests. For example, authenticated users can try to download sensitive files such as /etc/passwd using command-line tools.

  • Use curl to send a crafted request to the server.copyfile API endpoint to attempt downloading /etc/passwd.
  • Use wget similarly to request sensitive files via the vulnerable API endpoint.

What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart