Cyber Posture

CVE-2025-66315

Medium

Published: 09 January 2026

Published
09 January 2026
Modified
12 March 2026
KEV Added
Patch
CVSS Score 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
EPSS Score 0.0005 15.6th percentile
Risk Priority 9 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-66315 is a medium-severity Improper Privilege Management (CWE-269) vulnerability in Zte Mf258K Pro Firmware. Its CVSS base score is 4.3 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique File System Permissions Weakness (T1044); ranked at the 15.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to File System Permissions Weakness (T1044).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-269 CWE-863

Policy addresses roles, responsibilities, and privilege management to prevent improper privilege assignments.

addresses: CWE-269 CWE-863

Access supervision ensures privileges are assigned and managed without improper escalation or retention.

addresses: CWE-269 CWE-863

Assigning group/role memberships and access authorizations (privileges) while reviewing accounts addresses improper privilege management.

addresses: CWE-863 CWE-269

The small, testable reference monitor reduces the likelihood of incorrect authorization implementations.

addresses: CWE-863 CWE-269

Certification evaluates whether authorization decisions are correctly implemented and enforced.

addresses: CWE-863 CWE-269

Periodic review and documentation of connection needs reduces incorrect authorization.

addresses: CWE-269 CWE-863

Restricting who can perform changes helps ensure privileges are managed properly rather than assigned broadly.

addresses: CWE-269 CWE-863

Manages privileges by authorizing only approved personnel and supervising those lacking required authorizations for maintenance.

MITRE ATT&CK Enterprise TechniquesAI

T1044 File System Permissions Weakness Persistence
Processes may automatically execute specific binaries as part of their functionality or to perform other actions.
Why these techniques?

Improper directory permissions (CWE-269/863) directly constitute a file system permissions weakness allowing low-privileged network write access.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

There is a configuration defect vulnerability in the version server of ZTE MF258K Pro products. Due to improper directory permission settings, an attacker can execute write permissions in a specific directory.

Deeper analysisAI

CVE-2025-66315 is a configuration defect vulnerability in the version server of ZTE MF258K Pro products. The flaw arises from improper directory permission settings, enabling an attacker to execute write permissions in a specific directory. It carries a CVSS v3.1 base score of 4.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) and maps to CWE-269 and CWE-863.

A low-privileged user (PR:L) can exploit this vulnerability over the network (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N). Exploitation allows write access to a specific directory in an unchanged scope (S:U), resulting in low impact to availability (A:L) with no effects on confidentiality or integrity.

Mitigation guidance is available in the ZTE security bulletin at https://support.zte.com.cn/zte-iccp-isupport-webui/bulletin/detail/4891644183717871638.

Details

CWE(s)

Affected Products

zte
mf258k pro firmware
zte_mf258kpro_play_v1.0.0b03, zte_mf258pro_std_v1.0.0b04

CVEs Like This One

CVE-2025-26705Same vendor: Zte
CVE-2025-26702Same vendor: Zte
CVE-2026-40436Same vendor: Zte
CVE-2026-29127Shared CWE-269, CWE-863
CVE-2026-34472Same vendor: Zte
CVE-2025-29924Shared CWE-269, CWE-863
CVE-2026-27899Shared CWE-269, CWE-863
CVE-2026-40291Shared CWE-269, CWE-863
CVE-2026-27802Shared CWE-269, CWE-863
CVE-2026-27803Shared CWE-269, CWE-863

References