An authenticated, read-only user can upload a file and perform a directory traversal to have the uploaded file placed in a location of their choosing. This can be used to overwrite existing PERL modules within the application to achieve remote code execution (RCE) by an attacker.
Metrics
Affected Vendors & Products
References
History
Thu, 09 Oct 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:xorux:lpar2rrd:*:*:*:*:*:*:*:* |
Tue, 29 Jul 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 29 Jul 2025 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Xorux
Xorux lpar2rrd |
|
| Vendors & Products |
Xorux
Xorux lpar2rrd |
Mon, 28 Jul 2025 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An authenticated, read-only user can upload a file and perform a directory traversal to have the uploaded file placed in a location of their choosing. This can be used to overwrite existing PERL modules within the application to achieve remote code execution (RCE) by an attacker. | |
| Title | KL-001-2025-016: Xorux LPAR2RRD File Upload Directory Traversal | |
| Weaknesses | CWE-24 CWE-434 CWE-648 |
|
| References |
|
Status: PUBLISHED
Assigner: KoreLogic
Published: 2025-07-28T23:34:38.972Z
Updated: 2025-07-29T13:22:11.335Z
Reserved: 2025-07-28T16:02:18.186Z
Link: CVE-2025-54769
Updated: 2025-07-29T13:20:57.115Z
Status : Analyzed
Published: 2025-07-29T00:15:24.473
Modified: 2025-10-09T17:43:42.650
Link: CVE-2025-54769
No data.