Multiple Western Telematic (WTI) products contain a web interface that is vulnerable to a local file inclusion attack (LFI), where any authenticated user has privileged access to files on the device's filesystem.
Fixes

Solution

Western Telematic Inc reports this issue was discovered and patched in 2020. Western Telematic Inc recommends users follow best practices and update to the latest version. * For DSM/CPM units: Update to 8.06 https://ftp.wti.com/pub/TechSupport/Firmware_ARM/ * For NPS units: Update 4.02 https://ftp.wti.com/pub/TechSupport/Firmware_ARM/ * Ensure the default passwords are changed prior to deployment


Workaround

No workaround given by the vendor.

History

Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00046}

epss

{'score': 0.00052}


Wed, 12 Feb 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 04 Feb 2025 19:45:00 +0000

Type Values Removed Values Added
Description Multiple Western Telematic (WTI) products contain a web interface that is vulnerable to a local file inclusion attack (LFI), where any authenticated user has privileged access to files on the device's filesystem.
Title Western Telematic Inc NPS Series, DSM Series, CPM Series External Control of File Name or Path
Weaknesses CWE-73
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-02-12T20:51:28.515Z

Reserved: 2025-01-21T20:40:41.730Z

Link: CVE-2025-0630

cve-icon Vulnrichment

Updated: 2025-02-12T20:42:41.063Z

cve-icon NVD

Status : Received

Published: 2025-02-04T20:15:49.940

Modified: 2025-02-04T20:15:49.940

Link: CVE-2025-0630

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.