CVE-2019-25610
Description
NetNumber Titan Master 7.9.1 contains a path traversal vulnerability in the drp endpoint that allows authenticated users to download arbitrary files by injecting directory traversal sequences. Attackers can manipulate the path parameter with base64-encoded payloads containing ../ sequences to bypass authorization and retrieve sensitive system files like /etc/shadow.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
NetNumber Titan Master 7.9.1 drp endpoint allows authenticated path traversal via base64-encoded payloads, enabling arbitrary file downloads.
Vulnerability
Description
CVE-2019-25610 is a path traversal vulnerability in the NetNumber Titan Master 7.9.1 web GUI, specifically within the drp endpoint [1][2]. The root cause is improper input validation of the path parameter, which accepts base64-encoded values. An attacker can inject directory traversal sequences (e.g., ../) by encoding them in base64 and replacing the = padding characters with $ signs. While the endpoint is meant to provide trace file downloads, the lack of sanitization allows escape from the intended directory [2].
Exploitation
The attack requires an authenticated session to the Titan Master web GUI; however, even low-privileged users can exploit this flaw [2]. The HTTP request is sent to /drp?download=true&path=<base64-encoded-payload>, where the payload decodes to a path containing ../ sequences. The reference exploit demonstrates retrieving /etc/shadow by encoding a path that traverses to the system root [2]. The webserver runs with elevated privileges, making sensitive system files accessible [2].
Impact
Successful exploitation allows an authenticated remote attacker to download arbitrary files from the server, including sensitive system files such as /etc/shadow [1][2][3]. This can lead to further compromise, such as credential theft or privilege escalation. The vulnerability has a CVSS v3 base score of 6.5 (Medium) [3].
Mitigation
The vendor has addressed the issue in a newer version of the software [2]. Users running Titan Master 7.9.1 or earlier should upgrade to the patched version to mitigate the risk. No official workaround is documented, but restricting access to the web GUI or monitoring for unusual base64-encoded path parameters could serve as interim measures [1][2][3].
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: = 7.9.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.