Cyber Posture

CVE-2025-25684

High

Published: 17 March 2025

Published
17 March 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0033 56.2th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-25684 is a high-severity Path Traversal (CWE-22) vulnerability. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 43.8% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validation of the path parameter in the /download endpoint to prevent path traversal and arbitrary file downloads exploited in this CVE.

prevent

Mandates identification, reporting, and correction of flaws such as this path traversal vulnerability through firmware updates.

prevent

Enforces logical access controls to restrict unauthorized file system access, mitigating impacts of insufficient path validation in the vulnerable endpoint.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1552.001 Credentials In Files Credential Access
Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials.
Why these techniques?

Path traversal in unauthenticated web interface enables remote arbitrary file access on network device, directly supporting T1190 for initial access and T1552.001 for retrieving credentials/keys from config/logs.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

A lack of validation in the path parameter (/download) of GL-INet Beryl AX GL-MT3000 v4.7.0 allows attackers to download arbitrary files from the device's file system via a crafted POST request.

Deeper analysisAI

CVE-2025-25684 is a path traversal vulnerability (CWE-22) in the GL-INet Beryl AX GL-MT3000 router running firmware version v4.7.0. The issue stems from insufficient validation of the path parameter in the /download endpoint, enabling attackers to traverse directories and access arbitrary files on the device's file system through a specially crafted POST request.

The vulnerability has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating it is exploitable over the network with low complexity, no required privileges or user interaction, and no impact on integrity or availability. Remote attackers who can reach the router's web interface can send a malicious POST request to download sensitive files, such as configuration data or logs, potentially exposing credentials, keys, or other critical information.

Mitigation details and additional context are available in the advisory published at https://medium.com/@tfortinsec/multiple-path-traversal-vulnerabilities-in-the-beryl-ax-gl-mt300-router-e7f856d14af9.

Details

CWE(s)

CVEs Like This One

CVE-2026-25992Shared CWE-22
CVE-2026-22199Shared CWE-22
CVE-2026-3585Shared CWE-22
CVE-2026-26217Shared CWE-22
CVE-2026-30403Shared CWE-22
CVE-2026-28679Shared CWE-22
CVE-2026-30869Shared CWE-22
CVE-2026-33077Shared CWE-22
CVE-2024-57727Shared CWE-22
CVE-2026-35615Shared CWE-22

References