Description
NetNumber Titan Master 7.9.1 contains a path traversal vulnerability in the drp endpoint that allows authenticated users to download arbitrary files by injecting directory traversal sequences. Attackers can manipulate the path parameter with base64-encoded payloads containing ../ sequences to bypass authorization and retrieve sensitive system files like /etc/shadow.
Published: 2026-03-22
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Confidentiality breach via arbitrary file download
Action: Immediate Patch
AI Analysis

Impact

NetNumber Titan Master 7.9.1 contains a path traversal vulnerability in the drp endpoint that enables authenticated users to download arbitrary files. By injecting base64-encoded payloads with "../" sequences, attackers can bypass normal authorization and retrieve sensitive system files such as /etc/shadow, compromising the confidentiality of the system.

Affected Systems

The vulnerability affects NetNumber Titan Master version 7.9.1, an ENUM/DNS/NP management platform provided by NetNumber. No other versions are referenced in this report.

Risk and Exploitability

The CVSS score of 7.1 indicates high severity, while the EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires valid authentication, so attackers need legitimate credentials or must first compromise an account. The attack vector is likely through the HTTP API exposed by the drp endpoint, and the vulnerability can be exploited by supplying crafted base64 encoded paths that resolve to arbitrary files on the system.

Generated by OpenCVE AI on March 22, 2026 at 14:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade NetNumber Titan Master to a patched version that fixes the path traversal issue.
  • If no patch is available, restrict access to the drp endpoint to trusted administrators only, and monitor for unauthorized access attempts.
  • Verify that file download requests are validated and constrained to legitimate paths, preventing directory traversal by sanitizing input and rejecting encoded traversal sequences.

Generated by OpenCVE AI on March 22, 2026 at 14:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Netnumber
Netnumber netnumber Titan Enum/dns/np
Vendors & Products Netnumber
Netnumber netnumber Titan Enum/dns/np

Sun, 22 Mar 2026 13:45:00 +0000

Type Values Removed Values Added
Description NetNumber Titan Master 7.9.1 contains a path traversal vulnerability in the drp endpoint that allows authenticated users to download arbitrary files by injecting directory traversal sequences. Attackers can manipulate the path parameter with base64-encoded payloads containing ../ sequences to bypass authorization and retrieve sensitive system files like /etc/shadow.
Title NetNumber Titan Master 7.9.1 Path Traversal via drp
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Netnumber Netnumber Titan Enum/dns/np
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-23T15:54:58.218Z

Reserved: 2026-03-22T13:16:05.278Z

Link: CVE-2019-25610

cve-icon Vulnrichment

Updated: 2026-03-23T15:54:50.828Z

cve-icon NVD

Status : Deferred

Published: 2026-03-22T14:16:29.180

Modified: 2026-04-16T16:19:50.757

Link: CVE-2019-25610

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:46:06Z

Weaknesses