Cyber Posture

CVE-2019-25472

HighPublic PoC

Published: 11 March 2026

Published
11 March 2026
Modified
12 March 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0004 12.7th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2019-25472 is a high-severity External Control of File Name or Path (CWE-73) vulnerability in Intelbras (inferred from references). Its CVSS base score is 7.5 (High).

Operationally, ranked at the 12.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-73

Rejects externally supplied file or resource identifiers that fail validity checks.

NVD Description

IntelBras Telefone IP TIP200 and 200 LITE contain an unauthenticated arbitrary file read vulnerability in the dumpConfigFile function accessible via the cgiServer.exx endpoint. Attackers can send GET requests to /cgi-bin/cgiServer.exx with the command parameter containing dumpConfigFile() to read sensitive files…

more

including /etc/shadow and configuration files without proper authorization.

Deeper analysisAI

CVE-2019-25472 is an unauthenticated arbitrary file read vulnerability affecting IntelBras Telefone IP TIP200 and 200 LITE devices. The issue resides in the dumpConfigFile function, which is exposed via the cgiServer.exx endpoint without proper authorization checks. Attackers can exploit this by sending unauthenticated GET requests to /cgi-bin/cgiServer.exx with a command parameter set to dumpConfigFile(), enabling the retrieval of sensitive files such as /etc/shadow and device configuration files. The vulnerability carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) and is associated with CWE-73.

Any remote attacker with network access to the affected device can exploit this vulnerability without authentication, privileges, or user interaction. Successful exploitation allows the attacker to read arbitrary files, potentially exposing hashed passwords from /etc/shadow, administrative credentials, and other configuration data stored on the device. This high confidentiality impact can facilitate further attacks, such as credential theft for lateral movement or privilege escalation within the network.

Advisories and related resources include an IntelBras integration document, a proof-of-concept exploit on Exploit-DB (ID 47337), and a Vulncheck advisory detailing the arbitrary file read via dumpConfigFile. These references provide technical details and exploitation demonstrations but do not specify patches or mitigations in the available information.

Details

CWE(s)

Affected Products

Intelbras
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-28442Shared CWE-73
CVE-2025-66254Shared CWE-73
CVE-2025-25761Shared CWE-73
CVE-2026-25605Shared CWE-73
CVE-2026-26360Shared CWE-73
CVE-2025-12529Shared CWE-73
CVE-2026-25628Shared CWE-73
CVE-2025-66257Shared CWE-73
CVE-2026-30287Shared CWE-73
CVE-2026-5809Shared CWE-73

References