CVE Vulnerabilities

CVE-2025-41720

Reliance on File Name or Extension of Externally-Supplied File

Published: Oct 22, 2025 | Modified: Oct 22, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

A low privileged remote attacker can upload arbitrary data masked as a png file to the affected device using the webserver API because only the file extension is verified.

Weakness

The product allows a file to be uploaded, but it relies on the file name or extension of the file to determine the appropriate behaviors. This could be used by attackers to cause the file to be misclassified and processed in a dangerous fashion.

Potential Mitigations

References