Description
A remote file disclosure vulnerability exists in EasyCafe Server 2.2.14, exploitable by unauthenticated remote attackers via TCP port 831. The server listens for a custom protocol where opcode 0x43 can be used to request arbitrary files by absolute path. If the file exists and is accessible, its content is returned without authentication. This flaw allows attackers to retrieve sensitive files such as system configuration, password files, or application data.
Published: 2025-07-16
Score: 8.8 High
EPSS: 29.6% Moderate
KEV: No
Impact: Remote File Disclosure
Action: Patch Now
AI Analysis

Impact

A remote file disclosure vulnerability is present in EasyCafe Server 2.2.14 that allows an unauthenticated attacker to retrieve arbitrary files by sending opcode 0x43 over TCP port 831. The server responds with the requested file contents if the file is accessible, exposing sensitive data such as configuration files, passwords, or application data. The flaw does not grant code execution or privilege escalation, but it enables significant confidentiality loss.

Affected Systems

The affected product is Tinasoft EasyCafe Server version 2.2.14. No other versions were listed.

Risk and Exploitability

The CVSS score of 8.8 indicates a high severity, and an EPSS score of 30% reflects a high probability that the exploit is being used in the wild. The vulnerability is not listed in CISA’s KEV catalog. Attackers can trigger the flaw from any network location that can reach TCP port 831, without authentication or additional access rights, making it readily exploitable.

Generated by OpenCVE AI on April 22, 2026 at 22:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the vendor‑supplied patch for EasyCafe Server 2.2.14 or upgrade to a later, unvulnerable version.
  • Block or restrict traffic to TCP port 831 using firewall rules so that only trusted hosts can reach the server.
  • Disable or limit the use of opcode 0x43 in the server configuration, or enforce strict file‑path validation to prevent arbitrary file access.

Generated by OpenCVE AI on April 22, 2026 at 22:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-21751 A remote file disclosure vulnerability exists in EasyCafe Server 2.2.14, exploitable by unauthenticated remote attackers via TCP port 831. The server listens for a custom protocol where opcode 0x43 can be used to request arbitrary files by absolute path. If the file exists and is accessible, its content is returned without authentication. This flaw allows attackers to retrieve sensitive files such as system configuration, password files, or application data.
History

Thu, 17 Jul 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 16 Jul 2025 21:15:00 +0000

Type Values Removed Values Added
Description A remote file disclosure vulnerability exists in EasyCafe Server 2.2.14, exploitable by unauthenticated remote attackers via TCP port 831. The server listens for a custom protocol where opcode 0x43 can be used to request arbitrary files by absolute path. If the file exists and is accessible, its content is returned without authentication. This flaw allows attackers to retrieve sensitive files such as system configuration, password files, or application data.
Title EasyCafe Server 2.2.14 Remote File Disclosure via Opcode 0x43
Weaknesses CWE-306
CWE-668
References
Metrics cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-07T14:09:42.148Z

Reserved: 2025-04-15T19:15:22.561Z

Link: CVE-2025-34119

cve-icon Vulnrichment

Updated: 2025-07-17T19:59:45.621Z

cve-icon NVD

Status : Deferred

Published: 2025-07-16T21:15:26.827

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-34119

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T22:30:28Z

Weaknesses