CVE-2025-65074

7.2 HIGH

📋 TL;DR

This vulnerability allows high-privileged attackers to execute arbitrary operating system commands on WaveStore Server through path traversal in the showerr script via the WaveView client. It affects WaveStore Server installations with WaveView client access. Attackers can gain full control of the server if exploited.

💻 Affected Systems

Products:
  • WaveStore Server
Versions: All versions before 6.44.44
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WaveView client with high-privilege access to the vulnerable showerr script functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the WaveStore Server allowing arbitrary command execution, data theft, system manipulation, and potential lateral movement to other systems.

🟠

Likely Case

Privileged attackers with WaveView client access can execute commands to disrupt video management operations, exfiltrate surveillance data, or install persistent backdoors.

🟢

If Mitigated

With proper network segmentation and privilege restrictions, impact limited to isolated video management segment with no critical system access.

🌐 Internet-Facing: MEDIUM - Risk exists if WaveView client is exposed to internet, but requires high-privilege credentials.
🏢 Internal Only: HIGH - Internal attackers with administrative WaveView access can exploit this to compromise the server.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires high-privilege WaveView credentials and knowledge of the path traversal technique in the showerr script.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.44.44

Vendor Advisory: https://www.wavestore.com/products/video-management-software

Restart Required: Yes

Instructions:

1. Download WaveStore Server version 6.44.44 from vendor website. 2. Backup current configuration and data. 3. Install the update following vendor documentation. 4. Restart the WaveStore Server service.

🔧 Temporary Workarounds

Restrict WaveView Client Access

all

Limit WaveView client connections to trusted IP addresses only

Configure firewall rules to allow only specific IPs to connect to WaveStore Server port

Reduce WaveView Privileges

all

Remove high-privilege access from WaveView users who don't need it

Review and modify user permissions in WaveStore administration interface

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate WaveStore Server from critical systems
  • Enable detailed logging and monitoring of all WaveView client activities and command executions

🔍 How to Verify

Check if Vulnerable:

Check WaveStore Server version in administration interface or via system information command

Check Version:

Check version in WaveStore Server web interface or consult vendor documentation for CLI version check

Verify Fix Applied:

Confirm version is 6.44.44 or later in WaveStore Server administration panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual command executions via WaveView client
  • Multiple failed path traversal attempts in server logs
  • showerr script executions with unusual parameters

Network Indicators:

  • Unusual outbound connections from WaveStore Server
  • WaveView client connections from unexpected IP addresses

SIEM Query:

source="WaveStore" AND (event="command_execution" OR event="showerr_script") AND parameters CONTAINS "../"

🔗 References

📤 Share & Export