IntelBras Telefone IP TIP200 and 200 LITE contain an unauthenticated arbitrary file read vulnerability in the dumpConfigFile function accessible via the cgiServer.exx endpoint. Attackers can send GET requests to /cgi-bin/cgiServer.exx with the command parameter containing dumpConfigFile() to read sensitive files including /etc/shadow and configuration files without proper authorization.

Project Subscriptions

Vendors Products
Intelbras Subscribe
Telefone Ip Tip 200 Subscribe
Telefone Ip Tip 200 Lite Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Intelbras
Intelbras telefone Ip Tip 200
Intelbras telefone Ip Tip 200 Lite
Vendors & Products Intelbras
Intelbras telefone Ip Tip 200
Intelbras telefone Ip Tip 200 Lite

Wed, 11 Mar 2026 22:30:00 +0000


Wed, 11 Mar 2026 22:00:00 +0000


Wed, 11 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 18:45:00 +0000

Type Values Removed Values Added
Description IntelBras Telefone IP TIP200 and 200 LITE contain an unauthenticated arbitrary file read vulnerability in the dumpConfigFile function accessible via the cgiServer.exx endpoint. Attackers can send GET requests to /cgi-bin/cgiServer.exx with the command parameter containing dumpConfigFile() to read sensitive files including /etc/shadow and configuration files without proper authorization.
Title IntelBras Telefone IP TIP200/200 LITE Arbitrary File Read via dumpConfigFile
Weaknesses CWE-73
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-11T21:44:07.795Z

Reserved: 2026-02-22T14:43:03.387Z

Link: CVE-2019-25472

cve-icon Vulnrichment

Updated: 2026-03-11T19:22:52.576Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-11T19:16:01.007

Modified: 2026-03-12T21:08:22.643

Link: CVE-2019-25472

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-12T09:57:12Z

Weaknesses