A low-privileged remote attacker can exploit the ubr-editfile method in wwwubr.cgi, an undocumented and unused API endpoint to write arbitrary files on the system.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://www.mbs-solutions.de/mbs-2025-0001 |
|
History
Mon, 09 Mar 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A low-privileged remote attacker can exploit the ubr-editfile method in wwwubr.cgi, an undocumented and unused API endpoint to write arbitrary files on the system. | |
| Title | Arbitrary Write with ubr-editfile | |
| Weaknesses | CWE-1242 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2026-03-09T08:16:10.423Z
Reserved: 2025-04-16T11:18:45.759Z
Link: CVE-2025-41756
No data.
Status : Received
Published: 2026-03-09T09:15:59.370
Modified: 2026-03-09T09:15:59.370
Link: CVE-2025-41756
No data.
OpenCVE Enrichment
No data.
Weaknesses