VYPR
Medium severity6.5NVD Advisory· Published Aug 8, 2025· Updated Apr 15, 2026

CVE-2025-8749

CVE-2025-8749

Description

Path Traversal vulnerability in API Endpoint in Mobile Industrial Robots (MiR) Software Versions prior to 3.0.0 on MiR Robots allows authenticated users to extract files from the robot file system via a crafted API request.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A path traversal vulnerability in MiR robot software before 3.0.0 allows authenticated users to read arbitrary files via a crafted API request.

What is the vulnerability?

CVE-2025-8749 is a path traversal vulnerability affecting the API endpoint in Mobile Industrial Robots (MiR) software prior to version 3.0.0 [1][2]. The root cause lies in insufficient validation of user-supplied file paths, allowing an authenticated attacker to traverse directories and access files outside the intended directory [2].

How is it exploited?

An attacker must first have a valid user account on the MiR robot system [1][2]. With network access to the affected API endpoint, the attacker can craft a request containing path traversal sequences (e.g., ../) to escape the restricted file area and read arbitrary files from the robot's file system [2]. The vulnerability requires authentication, but no special privileges beyond a standard user account [2].

Impact

Successful exploitation leads to unauthorized disclosure of sensitive information stored on the robot, such as configuration files, logs, or other data accessible to the system user [1][2]. The CVSS score of 6.5 (Medium) reflects the confidentiality impact (HIGH) but no direct impact on integrity or availability [2].

Mitigation

MiR has released software version 3.0.0 which addresses this issue; users are advised to update to the latest version [2]. For robots that cannot be immediately updated, restricting network access to authenticated users and monitoring API requests may reduce risk [1][2].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.