VYPR
Medium severity5.3NVD Advisory· Published Feb 11, 2026· Updated Apr 15, 2026

CVE-2025-64074

CVE-2025-64074

Description

A path-traversal vulnerability in the logout functionality of Shenzhen Zhibotong Electronics ZBT WE2001 23.09.27 allows remote attackers to delete arbitrary files on the host by supplying a crafted session cookie value.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A path-traversal flaw in ZBT WE2001 router logout lets remote attackers delete arbitrary files via a crafted session cookie.

Root

Cause

The vulnerability resides in the logout operation of the webapi shell script on the ZBT WE2001 router (firmware 23.09.27). The script directly concatenates the user-supplied access_token parameter into an rm command without any sanitization. Specifically, the code reads FORM_access_token and executes rm /tmp/webapi_token/session/${FORM_access_token}, allowing an attacker to inject directory-traversal sequences such as ../ to escape the intended session directory [2].

Attack

Requirements

Exploitation requires knowledge of the router's IP address (default often 192.168.1.1) and that the /tmp/webapi_token/session/ directory exists — which is automatically created when at least one valid session is active on the device. The attacker can send a crafted HTTP GET or POST request directly to the vulnerable cgi-bin/webapi endpoint with the op=logout parameter and a malicious access_token value containing path traversal sequences. No authentication is needed because the logout operation processes the token before verifying the session [2].

Impact

A remote, unauthenticated attacker can delete arbitrary files on the host system by navigating the file system via ../ sequences. This includes critical system files (e.g., configuration files, system binaries, boot configurations). Deleting files such as /etc/hosts or firewall rules can disrupt network functionality, while removal of startup scripts or binaries can render the device inoperable, potentially requiring a factory reset [2].

Mitigation

As of the publication date, Shenzhen Zhibotong Electronics has not released a firmware patch for this vulnerability. The vendor's general product page [1] does not mention any security update. Users should consider applying access control restrictions on the router's web interface (e.g., limit LAN access to trusted devices) until an official fix is available. No workaround that fully eliminates the risk without code changes has been documented.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.