CVE-2025-67160
Published: 02 January 2026
Summary
CVE-2025-67160 is a high-severity Path Traversal (CWE-22) vulnerability in Vatilon Pa4 Firmware. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 48.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Validates pathnames and filenames to prevent traversal outside intended directories.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Directory traversal directly enables remote exploitation of a public-facing app (T1190) and unauthorized reading of local files/directories (T1005, T1083).
NVD Description
An issue in Vatilon v1.12.37-20240124 allows attackers to access sensitive directories and files via a directory traversal.
Deeper analysisAI
CVE-2025-67160 is a directory traversal vulnerability (CWE-22) in Vatilon version 1.12.37-20240124. Published on 2026-01-02, it enables attackers to access sensitive directories and files. The issue carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high severity due to its potential for significant confidentiality impact.
Unauthenticated remote attackers can exploit this vulnerability over the network with low attack complexity and no user interaction required. Exploitation allows reading of sensitive files and directories, compromising confidentiality without impacting integrity or availability.
Mitigation details and additional information are available in advisories referenced at http://vatilon.com and https://github.com/Remenis/CVE-2025-67160.
Details
- CWE(s)