CVE-2025-66608
Awaiting Analysis Awaiting Analysis - Queue
Improper URL Validation in Yokogawa FAST/TOOLS Enables File Theft

Publication date: 2026-02-09

Last updated on: 2026-03-06

Assigner: YokogawaGroup

Description
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product does not properly validate URLs. An attacker could send specially crafted requests to steal files from the web server. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-09
Last Modified
2026-03-06
Generated
2026-05-07
AI Q&A
2026-02-09
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
yokogawa fast/tools From r9.01 (inc) to r10.04 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-29 The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '\..\filename' (leading backslash dot dot) sequences that can resolve to a location that is outside of that directory.
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?

I don't know


Can you explain this vulnerability to me?

This vulnerability exists in the FAST/TOOLS product by Yokogawa Electric Corporation. The issue is that the product does not properly validate URLs, which allows an attacker to send specially crafted requests to the web server.

By exploiting this flaw, an attacker could steal files from the web server.


How can this vulnerability impact me? :

The vulnerability can lead to unauthorized access to files on the web server hosting FAST/TOOLS. This means sensitive or critical files could be stolen by an attacker without any authentication or user interaction.

Such unauthorized file access could compromise the confidentiality and integrity of data, potentially leading to further exploitation or data breaches.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart