CVE-2019-25706
Published: 12 April 2026
Summary
CVE-2019-25706 is a high-severity Insertion of Sensitive Information into Externally-Accessible File or Directory (CWE-538) vulnerability in I8I (inferred from references). Its CVSS base score is 7.5 (High).
Operationally, ranked at the 15.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and AC-22 (Publicly Accessible Content).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prohibits permitting unauthenticated access to sensitive functions like the rom-0 endpoint that discloses backup files containing passwords and configuration data.
Requires restrictions on access to publicly accessible content, preventing exposure of sensitive router backup files via unauthenticated GET requests.
Enforces protections against unauthorized information disclosure through public interfaces, mitigating the unauthenticated download of sensitive rom-0 backup files.
NVD Description
Across DR-810 contains an unauthenticated file disclosure vulnerability that allows remote attackers to download the rom-0 backup file containing sensitive information by sending a simple GET request. Attackers can access the rom-0 endpoint without authentication to retrieve and decompress the…
more
backup file, exposing router passwords and other sensitive configuration data.
Deeper analysisAI
CVE-2019-25706 is an unauthenticated file disclosure vulnerability in the Across DR-810 router. It allows remote attackers to download the rom-0 backup file, which contains sensitive information including router passwords and other configuration data, by sending a simple GET request to the rom-0 endpoint without any authentication. The vulnerability is rated with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) and is associated with CWE-538 (Insertion of Sensitive Information into Log File).
Remote attackers with network access to the affected router can exploit this vulnerability without privileges or user interaction. By accessing the rom-0 endpoint via a GET request, they can retrieve the backup file, decompress it, and extract sensitive data such as passwords and configuration details, potentially enabling further network compromise or lateral movement.
Advisories and references, including the Vulncheck advisory on the Across DR-810 rom-0 unauthenticated file disclosure and an Exploit-DB entry (exploit 46132), document the issue, with the latter providing a proof-of-concept exploit. Additional details are available at http://www.ac.i8i.ir/. No specific patch or mitigation details are outlined in the provided information.
Details
- CWE(s)