The specific flaw exists within the parsing of CHX files. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-26913.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-26445 | Anritsu ShockLine CHX File Parsing Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Anritsu ShockLine. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of CHX files. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-26913. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://www.zerodayinitiative.com/advisories/ZDI-25-647/ |
|
Wed, 24 Sep 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Anritsu
Anritsu shockline |
|
| CPEs | cpe:2.3:a:anritsu:shockline:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Anritsu
Anritsu shockline |
Tue, 02 Sep 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 02 Sep 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Anritsu ShockLine CHX File Parsing Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Anritsu ShockLine. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of CHX files. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-26913. | |
| Title | Anritsu ShockLine CHX File Parsing Directory Traversal Remote Code Execution Vulnerability | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: zdi
Published:
Updated: 2025-09-02T20:34:51.366Z
Reserved: 2025-07-21T19:47:04.431Z
Link: CVE-2025-7975
Updated: 2025-09-02T20:34:49.011Z
Status : Analyzed
Published: 2025-09-02T20:15:38.153
Modified: 2025-09-24T20:42:21.560
Link: CVE-2025-7975
No data.
OpenCVE Enrichment
No data.
EUVD