CVE-2025-65074
📋 TL;DR
This vulnerability allows high-privileged attackers to execute arbitrary operating system commands on WaveStore Server through path traversal in the showerr script via the WaveView client. It affects WaveStore Server installations with WaveView client access. Attackers can gain full control of the server if exploited.
💻 Affected Systems
- WaveStore Server
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the WaveStore Server allowing arbitrary command execution, data theft, system manipulation, and potential lateral movement to other systems.
Likely Case
Privileged attackers with WaveView client access can execute commands to disrupt video management operations, exfiltrate surveillance data, or install persistent backdoors.
If Mitigated
With proper network segmentation and privilege restrictions, impact limited to isolated video management segment with no critical system access.
🎯 Exploit Status
Exploitation requires high-privilege WaveView credentials and knowledge of the path traversal technique in the showerr script.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 6.44.44
Vendor Advisory: https://www.wavestore.com/products/video-management-software
Restart Required: Yes
Instructions:
1. Download WaveStore Server version 6.44.44 from vendor website. 2. Backup current configuration and data. 3. Install the update following vendor documentation. 4. Restart the WaveStore Server service.
🔧 Temporary Workarounds
Restrict WaveView Client Access
allLimit WaveView client connections to trusted IP addresses only
Configure firewall rules to allow only specific IPs to connect to WaveStore Server port
Reduce WaveView Privileges
allRemove high-privilege access from WaveView users who don't need it
Review and modify user permissions in WaveStore administration interface
🧯 If You Can't Patch
- Implement strict network segmentation to isolate WaveStore Server from critical systems
- Enable detailed logging and monitoring of all WaveView client activities and command executions
🔍 How to Verify
Check if Vulnerable:
Check WaveStore Server version in administration interface or via system information command
Check Version:
Check version in WaveStore Server web interface or consult vendor documentation for CLI version check
Verify Fix Applied:
Confirm version is 6.44.44 or later in WaveStore Server administration panel
📡 Detection & Monitoring
Log Indicators:
- Unusual command executions via WaveView client
- Multiple failed path traversal attempts in server logs
- showerr script executions with unusual parameters
Network Indicators:
- Unusual outbound connections from WaveStore Server
- WaveView client connections from unexpected IP addresses
SIEM Query:
source="WaveStore" AND (event="command_execution" OR event="showerr_script") AND parameters CONTAINS "../"