CVE-2025-64057
Published: 05 December 2025
Summary
CVE-2025-64057 is a high-severity Path Traversal (CWE-22) vulnerability in Fanvil X210 Firmware. Its CVSS base score is 8.3 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 21.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates directory traversal by validating inputs to file storage operations, preventing path manipulation by unauthenticated attackers.
Ensures timely flaw remediation through vendor patches for this specific directory traversal vulnerability in Fanvil x210 V2 firmware.
Monitors and controls network communications to limit unauthorized adjacent (AV:A) access to the vulnerable device on the local network.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Directory traversal vulnerability allows unauthenticated local network attackers to store arbitrary files, directly enabling exploitation of a public-facing application service on the device.
NVD Description
Directory traversal vulnerability in Fanvil x210 V2 2.12.20 allows unauthenticated attackers on the local network to store files in arbitrary locations and potentially modify the system configuration or other unspecified impacts.
Deeper analysisAI
CVE-2025-64057 is a directory traversal vulnerability (CWE-22) in Fanvil x210 V2 firmware version 2.12.20. Published on 2025-12-05, it carries a CVSS v3.1 base score of 8.3 (AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H), indicating high severity due to significant integrity and availability impacts with low confidentiality exposure.
Unauthenticated attackers on the local network can exploit this vulnerability to store files in arbitrary locations on the affected device. Successful exploitation may enable modification of the system configuration or result in other unspecified impacts.
Advisories are available from the vendor at http://fanvil.com and a third-party source at https://github.com/SpikeReply/advisories/blob/main/cve/fanvil/cve-2025-64057.md, which may provide further details on patches or mitigation steps.
Details
- CWE(s)