VYPR
Medium severity5.3NVD Advisory· Published Feb 10, 2026· Updated Apr 15, 2026

CVE-2026-25872

CVE-2026-25872

Description

JUNG Smart Panel KNX firmware version L1.12.22 and prior contain an unauthenticated path traversal vulnerability in the embedded web interface. The application fails to properly validate file path input, allowing remote, unauthenticated attackers to access arbitrary files on the underlying filesystem within the context of the web server. This may result in disclosure of system configuration files and other sensitive information.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

JUNG Smart Panel KNX firmware ≤ L1.12.22 has an unauthenticated path traversal bug, letting remote attackers read arbitrary system files via the web interface.

Vulnerability

Analysis

CVE-2026-25872 affects JUNG Smart Panel KNX firmware versions L1.12.22 and earlier. The embedded web interface fails to properly validate file path input from users, allowing an unauthenticated attacker to traverse directories outside of the intended web root [1][3]. This path traversal vulnerability stems from insufficient sanitization of user-supplied paths, a classic for embedded devices lacking rigorous input handling.

Exploitation

The attack requires no authentication and can be performed remotely over the network. By sending crafted HTTP requests containing traversal sequences (e.g., ../), an attacker can navigate the filesystem within the privileges of the web server process [3]. No special prerequisites or prior access are needed, making this a critical attack surface for any exposed device.

Impact

Successful exploitation leads to disclosure of arbitrary files accessible by the web server, including system configuration files and other sensitive information [1][2]. This could expose passwords, network settings, or proprietary configuration data that may enable further compromise of the device or the broader KNX smart building infrastructure.

Mitigation

JUNG has not released a public patch as of February 2026. Users should restrict network access to the Smart Panel’s web interface to trusted networks only and consider applying workarounds such as input filtering if feasible. The vendor’s advisory or firmware update should be monitored for a permanent fix [2][3].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.