CVE-2025-2706

6.3 MEDIUM

📋 TL;DR

This critical vulnerability in Digiwin ERP 5.0.1 allows remote attackers to upload arbitrary files via the /Api/TinyMce/UploadAjaxAPI.ashx endpoint. Attackers can potentially execute malicious code on affected systems. All organizations running the vulnerable version are at risk.

💻 Affected Systems

Products:
  • Digiwin ERP
Versions: 5.0.1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only version 5.0.1 confirmed vulnerable. Other versions may also be affected but not verified.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, and lateral movement within the network.

🟠

Likely Case

Malware deployment, backdoor installation, and unauthorized file uploads leading to data exfiltration.

🟢

If Mitigated

File upload attempts blocked at network perimeter with no successful exploitation.

🌐 Internet-Facing: HIGH - Attack can be launched remotely and exploit is publicly available.
🏢 Internal Only: MEDIUM - Internal attackers could exploit if they have network access to the system.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available on GitHub. No authentication required to trigger the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Vendor has not responded to disclosure. Consider upgrading to a newer version if available or implementing workarounds.

🔧 Temporary Workarounds

Block Upload Endpoint

all

Restrict access to the vulnerable /Api/TinyMce/UploadAjaxAPI.ashx endpoint using web application firewall or network controls.

# WAF rule to block /Api/TinyMce/UploadAjaxAPI.ashx
# Network ACL to restrict access to this endpoint

File Upload Validation

all

Implement server-side file type validation and restrict uploads to specific file extensions.

# Configure web server to reject uploads with executable extensions
# Implement file signature validation

🧯 If You Can't Patch

  • Isolate the Digiwin ERP system in a separate network segment with strict access controls.
  • Implement application-level monitoring for file upload activities to the vulnerable endpoint.

🔍 How to Verify

Check if Vulnerable:

Check if Digiwin ERP version is 5.0.1 and the /Api/TinyMce/UploadAjaxAPI.ashx endpoint is accessible.

Check Version:

Check Digiwin ERP version in application interface or configuration files.

Verify Fix Applied:

Test if file uploads to the vulnerable endpoint are properly restricted or blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to /Api/TinyMce/UploadAjaxAPI.ashx
  • Uploads of executable files or scripts
  • Multiple failed upload attempts

Network Indicators:

  • HTTP POST requests to /Api/TinyMce/UploadAjaxAPI.ashx with file uploads
  • Unusual outbound connections from ERP system

SIEM Query:

source="web_server" AND uri="/Api/TinyMce/UploadAjaxAPI.ashx" AND method="POST" AND (file_extension="exe" OR file_extension="php" OR file_extension="asp" OR file_extension="aspx")

🔗 References

📤 Share & Export