CVE-2025-2982

6.3 MEDIUM

📋 TL;DR

This critical vulnerability in Legrand SMS PowerView 1.x allows remote attackers to perform file inclusion attacks by manipulating the redirect argument. This could lead to arbitrary code execution or sensitive information disclosure. All systems running affected versions are vulnerable.

💻 Affected Systems

Products:
  • Legrand SMS PowerView
Versions: 1.x
Operating Systems: Unknown
Default Config Vulnerable: ⚠️ Yes
Notes: Specific affected versions within 1.x range are not specified in available information.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Arbitrary file reading leading to sensitive information disclosure, configuration exposure, or limited code execution.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit has been publicly disclosed and remote exploitation is possible without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Vendor did not respond to disclosure. Consider workarounds or replacement.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to PowerView systems to only trusted IP addresses/networks

Use firewall rules to limit access: iptables -A INPUT -p tcp --dport [PORT] -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [PORT] -j DROP

Web Application Firewall

all

Deploy WAF with rules to block file inclusion patterns and redirect parameter manipulation

Configure WAF rules to block requests containing suspicious redirect parameters or file inclusion patterns

🧯 If You Can't Patch

  • Isolate affected systems in separate network segments with strict access controls
  • Implement monitoring and alerting for exploitation attempts and unusual file access patterns

🔍 How to Verify

Check if Vulnerable:

Check if system is running Legrand SMS PowerView version 1.x. Test with known exploit if in controlled environment.

Check Version:

Check application interface or configuration files for version information. No standard command available.

Verify Fix Applied:

No official fix available. Verify workarounds by testing restricted access and monitoring for exploitation attempts.

📡 Detection & Monitoring

Log Indicators:

  • Unusual redirect parameter values in web logs
  • File access attempts outside normal application directories
  • Error logs showing file inclusion failures

Network Indicators:

  • HTTP requests with manipulated redirect parameters
  • Unexpected file downloads or includes from web application

SIEM Query:

web_access_logs WHERE url CONTAINS 'redirect=' AND (url CONTAINS '../' OR url CONTAINS 'file:' OR url CONTAINS 'php://')

🔗 References

📤 Share & Export