CVE-2025-25685

CVSS 3.1 Score 7.5 of 10 (high)

Details

Published Mar 17, 2025
Updated: Mar 21, 2025
CWE ID 22

Summary

CVE-2025-25685 is a newly disclosed vulnerability affecting GL-INet Beryl AX GL-MT3000 v4.7.0. This issue allows attackers to manipulate symbolic links on an external drive used as a Samba share, enabling them to download arbitrary files from the device's file system. This poses a significant risk, as attackers can potentially gain unauthorized access to sensitive information stored on the device. Users are strongly advised to update their GL-INet Beryl AX GL-MT3000 firmware to a patched version as soon as possible to mitigate this vulnerability. Attackers can exploit the symbolic link functionality of an external drive to gain unauthorized access to files on the GL-INet Beryl AX GL-MT3000 v4.7.0 device. By creating malicious symbolic links, they can trick the system into downloading files from the external drive, effectively bypassing file access restrictions. This vulnerability potentially exposes users to data theft and other malicious activities. This issue is particularly concerning for organizations and individuals that use the GL-INet Beryl AX GL-MT3000 as a network storage solution. In a corporate environment, the compromise of a single device could lead to extensive data breaches and potential loss of intellectual property. As such, it is crucial for users to apply the patches released by GL-INet promptly to mitigate this vulnerability. The vulnerability, identified as CVE-2025-25685, underscores the importance of maintaining up-to-date firmware on networked devices to protect against potential security threats. Users should be vigilant about security updates and apply them as soon as they become available to minimize the risk of exposure. In summary, CVE-2025-25685 is a vulnerability impacting the GL-INet Beryl AX GL-MT3000 v4.7.0 that allows attackers to download arbitrary files by manipulating symbolic links on an external drive used as a Samba share. This issue poses a significant risk to sensitive data and intellectual property, making it essential for users to apply the available patch as soon as possible.

Ligh bulbPrevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share