A low-privileged remote attacker can exploit the ubr-editfile method in wwwubr.cgi, an undocumented and unused API endpoint to read arbitrary files on the system.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://www.mbs-solutions.de/mbs-2025-0001 |
|
History
Mon, 09 Mar 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A low-privileged remote attacker can exploit the ubr-editfile method in wwwubr.cgi, an undocumented and unused API endpoint to read arbitrary files on the system. | |
| Title | Arbitrary Read with ubr-editfile | |
| Weaknesses | CWE-1242 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2026-03-09T08:15:49.619Z
Reserved: 2025-04-16T11:18:45.759Z
Link: CVE-2025-41754
No data.
Status : Received
Published: 2026-03-09T09:15:58.903
Modified: 2026-03-09T09:15:58.903
Link: CVE-2025-41754
No data.
OpenCVE Enrichment
No data.
Weaknesses