CVE-2025-25685
Published: 17 March 2025
Description
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Security Summary
CVE-2025-25685 is a path traversal vulnerability (CWE-22) discovered in the GL-INet Beryl AX GL-MT3000 router running firmware version v4.7.0. The flaw allows attackers to download arbitrary files from the device's file system by creating symbolic links on an external drive configured as a Samba share. It has a CVSS v3.1 base score of 7.5, reflecting high confidentiality impact with network accessibility, low attack complexity, and no requirements for privileges or user interaction.
Attackers can exploit this vulnerability remotely without authentication by mounting an external drive as a Samba share on the router and manipulating symbolic links to traverse the file system paths. Successful exploitation enables unauthorized access to sensitive files on the device, such as configuration data or logs, potentially exposing credentials, network details, or other critical information.
References to the vulnerability include a Medium article detailing multiple path traversal issues in the Beryl AX GL-MT3000 router.
Details
- CWE(s)
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Path traversal in network-accessible Samba service on router enables remote exploitation of public-facing application (T1190) to download arbitrary files from device filesystem (T1005), exposing sensitive data like credentials.