CVE-2019-25472
Published: 11 March 2026
Summary
CVE-2019-25472 is a high-severity External Control of File Name or Path (CWE-73) vulnerability in Intelbras (inferred from references). Its CVSS base score is 7.5 (High).
Operationally, ranked at the 12.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Rejects externally supplied file or resource identifiers that fail validity checks.
NVD Description
IntelBras Telefone IP TIP200 and 200 LITE contain an unauthenticated arbitrary file read vulnerability in the dumpConfigFile function accessible via the cgiServer.exx endpoint. Attackers can send GET requests to /cgi-bin/cgiServer.exx with the command parameter containing dumpConfigFile() to read sensitive files…
more
including /etc/shadow and configuration files without proper authorization.
Deeper analysisAI
CVE-2019-25472 is an unauthenticated arbitrary file read vulnerability affecting IntelBras Telefone IP TIP200 and 200 LITE devices. The issue resides in the dumpConfigFile function, which is exposed via the cgiServer.exx endpoint without proper authorization checks. Attackers can exploit this by sending unauthenticated GET requests to /cgi-bin/cgiServer.exx with a command parameter set to dumpConfigFile(), enabling the retrieval of sensitive files such as /etc/shadow and device configuration files. The vulnerability carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) and is associated with CWE-73.
Any remote attacker with network access to the affected device can exploit this vulnerability without authentication, privileges, or user interaction. Successful exploitation allows the attacker to read arbitrary files, potentially exposing hashed passwords from /etc/shadow, administrative credentials, and other configuration data stored on the device. This high confidentiality impact can facilitate further attacks, such as credential theft for lateral movement or privilege escalation within the network.
Advisories and related resources include an IntelBras integration document, a proof-of-concept exploit on Exploit-DB (ID 47337), and a Vulncheck advisory detailing the arbitrary file read via dumpConfigFile. These references provide technical details and exploitation demonstrations but do not specify patches or mitigations in the available information.
Details
- CWE(s)