An authenticated, read-only user can upload a file and perform a directory traversal to have the uploaded file placed in a location of their choosing.  This can be used to overwrite existing PERL modules within the application to achieve remote code execution (RCE) by an attacker.
                
            Metrics
Affected Vendors & Products
References
        History
                    Mon, 03 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
         | 
Thu, 09 Oct 2025 17:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| CPEs | cpe:2.3:a:xorux:lpar2rrd:*:*:*:*:*:*:*:* | 
Tue, 29 Jul 2025 14:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        cvssV3_1
         
 
  | 
Tue, 29 Jul 2025 08:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Xorux
         Xorux lpar2rrd  | 
|
| Vendors & Products | 
        
        Xorux
         Xorux lpar2rrd  | 
Mon, 28 Jul 2025 23:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | An authenticated, read-only user can upload a file and perform a directory traversal to have the uploaded file placed in a location of their choosing. This can be used to overwrite existing PERL modules within the application to achieve remote code execution (RCE) by an attacker. | |
| Title | KL-001-2025-016: Xorux LPAR2RRD File Upload Directory Traversal | |
| Weaknesses | CWE-24 CWE-434 CWE-648  | 
|
| References | 
         | 
Status: PUBLISHED
Assigner: KoreLogic
Published: 2025-07-28T23:34:38.972Z
Updated: 2025-11-03T20:06:37.868Z
Reserved: 2025-07-28T16:02:18.186Z
Link: CVE-2025-54769
Updated: 2025-11-03T20:06:37.868Z
Status : Modified
Published: 2025-07-29T00:15:24.473
Modified: 2025-11-03T20:19:15.053
Link: CVE-2025-54769
No data.
ReportizFlow