CVE-2025-68916

9.1 CRITICAL

📋 TL;DR

This vulnerability allows attackers to perform directory traversal through the certsupload.cgi endpoint in Riello UPS NetMan 208 Application, enabling arbitrary file upload and subsequent remote code execution. Organizations using affected versions of this UPS management software are at risk, particularly those with internet-facing instances.

💻 Affected Systems

Products:
  • Riello UPS NetMan 208 Application
Versions: All versions before 1.12
Operating Systems: Linux-based embedded systems running the NetMan application
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerable CGI endpoint is typically accessible via web interface. Systems with the management interface exposed to untrusted networks are most at risk.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining root/administrator privileges, installing persistent backdoors, stealing credentials, and pivoting to other network systems.

🟠

Likely Case

Unauthenticated attackers upload malicious files to execute arbitrary commands, potentially disrupting UPS operations, modifying configurations, or establishing footholds for further attacks.

🟢

If Mitigated

With proper network segmentation and access controls, impact limited to the UPS management system itself without lateral movement to critical infrastructure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The GitHub reference contains proof-of-concept code demonstrating the directory traversal and file upload vulnerability. Exploitation requires minimal technical skill.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 1.12 or later

Vendor Advisory: https://github.com/gerico-lab/riello-multiple-vulnerabilities-2025

Restart Required: Yes

Instructions:

1. Download Riello UPS NetMan 208 Application version 1.12 or later from official vendor sources. 2. Backup current configuration. 3. Install the updated version following vendor documentation. 4. Restart the NetMan application service. 5. Verify the update was successful.

🔧 Temporary Workarounds

Network Access Restriction

linux

Block external access to the NetMan web interface using firewall rules

iptables -A INPUT -p tcp --dport 80 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

CGI Endpoint Disable

linux

Remove or restrict access to the vulnerable certsupload.cgi file

mv /path/to/cgi-bin/certsupload.cgi /path/to/cgi-bin/certsupload.cgi.disabled
chmod 000 /path/to/cgi-bin/certsupload.cgi.disabled

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate UPS management systems from production networks
  • Deploy web application firewall (WAF) rules to block directory traversal patterns and unauthorized file uploads

🔍 How to Verify

Check if Vulnerable:

Check if certsupload.cgi exists in the cgi-bin directory and test for directory traversal using ../ sequences in file upload parameters

Check Version:

Check the web interface login page or admin panel for version information, or examine application files for version metadata

Verify Fix Applied:

Verify the application version is 1.12 or higher and test that directory traversal attempts are properly rejected

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload attempts to certsupload.cgi
  • HTTP requests containing ../ sequences
  • Unexpected process execution from web server context

Network Indicators:

  • POST requests to /cgi-bin/certsupload.cgi with traversal patterns
  • Unusual outbound connections from UPS management system

SIEM Query:

source="web_logs" AND (uri="/cgi-bin/certsupload.cgi" OR uri CONTAINS "../") AND (method="POST" OR method="PUT")

🔗 References

📤 Share & Export