A vulnerability exists in Advantech iView in
NetworkServlet.processImportRequest() that could allow for a directory
traversal attack. This issue requires an authenticated attacker with at
least user-level privileges. A specific parameter is not properly
sanitized or normalized, potentially allowing an attacker to determine
the existence of arbitrary files on the server.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-21081 A vulnerability exists in Advantech iView in NetworkServlet.processImportRequest() that could allow for a directory traversal attack. This issue requires an authenticated attacker with at least user-level privileges. A specific parameter is not properly sanitized or normalized, potentially allowing an attacker to determine the existence of arbitrary files on the server.
Fixes

Solution

Advantech recommends users update to v5.7.05 build 7057 https://www.advantech.com/en/support/details/firmware- .


Workaround

No workaround given by the vendor.

History

Wed, 23 Jul 2025 19:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:advantech:iview:*:*:*:*:*:*:*:*

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00036}

epss

{'score': 0.0004}


Fri, 11 Jul 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00036}


Thu, 10 Jul 2025 23:30:00 +0000

Type Values Removed Values Added
Description A vulnerability exists in Advantech iView in NetworkServlet.processImportRequest() that could allow for a directory traversal attack. This issue requires an authenticated attacker with at least user-level privileges. A specific parameter is not properly sanitized or normalized, potentially allowing an attacker to determine the existence of arbitrary files on the server.
Title Advantech iView Path Traversal
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-07-11T13:40:07.067Z

Reserved: 2025-07-02T15:12:58.615Z

Link: CVE-2025-46704

cve-icon Vulnrichment

Updated: 2025-07-11T13:39:58.649Z

cve-icon NVD

Status : Analyzed

Published: 2025-07-11T00:15:25.583

Modified: 2025-07-23T19:20:26.673

Link: CVE-2025-46704

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-07-13T11:06:15Z