Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-21749 | An unauthenticated arbitrary file upload vulnerability exists in Idera Up.Time Monitoring Station versions up to and including 7.2. The `wizards/post2file.php` script accepts arbitrary POST parameters, allowing attackers to upload crafted PHP files to the webroot. Successful exploitation results in remote code execution as the web server user. NOTE: The bypass for this vulnerability is tracked as CVE-2015-9263. |
Thu, 17 Jul 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 16 Jul 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An unauthenticated arbitrary file upload vulnerability exists in Idera Up.Time Monitoring Station versions up to and including 7.2. The `wizards/post2file.php` script accepts arbitrary POST parameters, allowing attackers to upload crafted PHP files to the webroot. Successful exploitation results in remote code execution as the web server user. NOTE: The bypass for this vulnerability is tracked as CVE-2015-9263. | |
| Title | Idera Up.Time ≤ 7.2 post2file.php Arbitrary File Upload RCE | |
| Weaknesses | CWE-306 CWE-434 |
|
| References |
|
|
| Metrics |
cvssV4_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-15T11:14:48.027Z
Reserved: 2025-04-15T19:15:22.561Z
Link: CVE-2025-34121
Updated: 2025-07-17T19:46:49.605Z
Status : Deferred
Published: 2025-07-16T21:15:27.100
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-34121
No data.
OpenCVE Enrichment
Updated: 2026-05-12T14:45:17Z
EUVD