Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
6.5
A malicious attacker can access sensitive files on your system using wwwubr.cgi
CVE-2025-41755
Summary
A hacker can use the wwwubr.cgi tool to access files on your server, including sensitive ones, if you don't validate the files they request. This could expose confidential information. Regularly update your wwwubr.cgi tool to the latest version to fix this issue.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| mbs-solutions | universal_bacnet_router_firmware | <= 6.0.1.0 | – |
Original title
A low-privileged remote attacker can exploit the ubr-logread method in wwwubr.cgi to read arbitrary files on the system. The endpoint accepts a parameter specifying the log file to open (e.g., /tmp...
Original description
A low-privileged remote attacker can exploit the ubr-logread method in wwwubr.cgi to read arbitrary files on the system. The endpoint accepts a parameter specifying the log file to open (e.g., /tmp/weblog{some_number}), but this parameter is not properly validated, allowing an attacker to modify it to reference any file and retrieve its contents.
nvd CVSS3.1
6.5
Vulnerability type
CWE-22
Path Traversal
Published: 9 Mar 2026 · Updated: 13 Mar 2026 · First seen: 9 Mar 2026