Impact
NetNumber Titan Master 7.9.1 contains a path traversal vulnerability in the drp endpoint that enables authenticated users to download arbitrary files. By injecting base64-encoded payloads with "../" sequences, attackers can bypass normal authorization and retrieve sensitive system files such as /etc/shadow, compromising the confidentiality of the system.
Affected Systems
The vulnerability affects NetNumber Titan Master version 7.9.1, an ENUM/DNS/NP management platform provided by NetNumber. No other versions are referenced in this report.
Risk and Exploitability
The CVSS score of 7.1 indicates high severity, while the EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires valid authentication, so attackers need legitimate credentials or must first compromise an account. The attack vector is likely through the HTTP API exposed by the drp endpoint, and the vulnerability can be exploited by supplying crafted base64 encoded paths that resolve to arbitrary files on the system.
OpenCVE Enrichment