CVE-2025-41763
Unauthorized File Download via wwwdnload.cgi in Web Interface
Publication date: 2026-03-09
Last updated on: 2026-03-11
Assigner: CERT VDE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mbs-solutions | universal_bacnet_router_firmware | to 6.0.1.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-497 | The product does not properly prevent sensitive system-level information from being accessed by unauthorized actors who do not have the same level of access to the underlying system as the product does. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability allows a low-privileged remote attacker to directly interact with the wwwdnload.cgi endpoint. By doing so, the attacker can download any resource that is normally accessible only to administrators, including sensitive files such as system backups and certificate request files.
How can this vulnerability impact me? :
The impact of this vulnerability is significant because it enables unauthorized access to sensitive administrative resources. An attacker could obtain critical system backups and certificate request files, potentially leading to data exposure, system compromise, or misuse of certificates.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know