CVE-2025-49162

6.4 MEDIUM

📋 TL;DR

This vulnerability in Arris VIP1113 devices allows remote attackers to overwrite arbitrary files via TFTP by using specially crafted filenames containing spaces. Attackers can control the local filename on the device, potentially leading to system compromise. All Arris VIP1113 devices running KreaTV SDK through May 30, 2025 are affected.

💻 Affected Systems

Products:
  • Arris VIP1113
Versions: All versions through 2025-05-30
Operating Systems: Embedded Linux with KreaTV SDK
Default Config Vulnerable: ⚠️ Yes
Notes: Requires TFTP service to be enabled and accessible.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover through file overwrite leading to arbitrary code execution, persistent backdoor installation, or bricking of the device.

🟠

Likely Case

File system corruption, denial of service, or installation of malicious firmware/software on vulnerable devices.

🟢

If Mitigated

Limited impact if TFTP access is restricted to trusted networks only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to TFTP service and knowledge of vulnerable filename handling.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Monitor Arris security advisories for updates.

🔧 Temporary Workarounds

Disable TFTP Service

all

Disable TFTP service on affected devices to prevent exploitation.

Check device configuration for TFTP settings and disable if possible

Network Segmentation

all

Restrict TFTP access to trusted management networks only.

Configure firewall rules to block TFTP (port 69) from untrusted networks

🧯 If You Can't Patch

  • Isolate affected devices in separate network segments with strict access controls
  • Monitor TFTP traffic for suspicious filename patterns containing spaces

🔍 How to Verify

Check if Vulnerable:

Check device firmware version and confirm TFTP service is enabled and accessible.

Check Version:

Check device web interface or CLI for firmware version information

Verify Fix Applied:

Verify TFTP service is disabled or inaccessible from untrusted networks.

📡 Detection & Monitoring

Log Indicators:

  • TFTP access logs showing filenames with spaces
  • File system modification events in unexpected locations

Network Indicators:

  • TFTP traffic to port 69 with unusual filename patterns
  • Multiple TFTP requests with space characters in filenames

SIEM Query:

source_port:69 AND (filename:* * OR filename:*%20*)

🔗 References

📤 Share & Export