Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-22956 | An authenticated, read-only user can upload a file and perform a directory traversal to have the uploaded file placed in a location of their choosing. This can be used to overwrite existing PERL modules within the application to achieve remote code execution (RCE) by an attacker. |
Mon, 03 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 09 Oct 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:xorux:lpar2rrd:*:*:*:*:*:*:*:* |
Tue, 29 Jul 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 29 Jul 2025 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Xorux
Xorux lpar2rrd |
|
| Vendors & Products |
Xorux
Xorux lpar2rrd |
Mon, 28 Jul 2025 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An authenticated, read-only user can upload a file and perform a directory traversal to have the uploaded file placed in a location of their choosing. This can be used to overwrite existing PERL modules within the application to achieve remote code execution (RCE) by an attacker. | |
| Title | KL-001-2025-016: Xorux LPAR2RRD File Upload Directory Traversal | |
| Weaknesses | CWE-24 CWE-434 CWE-648 |
|
| References |
|
Status: PUBLISHED
Assigner: KoreLogic
Published:
Updated: 2025-11-03T20:06:37.868Z
Reserved: 2025-07-28T16:02:18.186Z
Link: CVE-2025-54769
Updated: 2025-11-03T20:06:37.868Z
Status : Modified
Published: 2025-07-29T00:15:24.473
Modified: 2025-11-03T20:19:15.053
Link: CVE-2025-54769
No data.
OpenCVE Enrichment
Updated: 2025-07-29T07:59:15Z
EUVD