Description
A path traversal vulnerability exists in Linknat VOS Manager versions prior to 2.1.9.07, including VOS2009 and early VOS3000 builds, that allows unauthenticated remote attackers to read arbitrary files on the server. The vulnerability is accessible via multiple localized subpaths such as '/eng/', '/chs/', or '/cht/', where the 'js/lang_en_us.js' or equivalent files are loaded. By injecting encoded traversal sequences such as '%c0%ae%c0%ae' into the request path, attackers can bypass input validation and disclose sensitive files.
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2025-34118, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2025-34118 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.
References:
- http://webappsec.pbworks.com/Improper-Input-Handling
- https://capec.mitre.org/data/definitions/10.html
- https://capec.mitre.org/data/definitions/101.html
- https://capec.mitre.org/data/definitions/104.html
- https://capec.mitre.org/data/definitions/108.html
- https://capec.mitre.org/data/definitions/109.html
- https://capec.mitre.org/data/definitions/110.html
- https://capec.mitre.org/data/definitions/120.html
- https://capec.mitre.org/data/definitions/13.html
- https://capec.mitre.org/data/definitions/135.html
- https://capec.mitre.org/data/definitions/136.html
- https://capec.mitre.org/data/definitions/14.html
- https://capec.mitre.org/data/definitions/153.html
- https://capec.mitre.org/data/definitions/182.html
- https://capec.mitre.org/data/definitions/209.html
- https://capec.mitre.org/data/definitions/22.html
- https://capec.mitre.org/data/definitions/23.html
- https://capec.mitre.org/data/definitions/230.html
- https://capec.mitre.org/data/definitions/231.html
- https://capec.mitre.org/data/definitions/24.html
- https://capec.mitre.org/data/definitions/250.html
- https://capec.mitre.org/data/definitions/261.html
- https://capec.mitre.org/data/definitions/267.html
- https://capec.mitre.org/data/definitions/28.html
- https://capec.mitre.org/data/definitions/3.html
- https://capec.mitre.org/data/definitions/31.html
- https://capec.mitre.org/data/definitions/42.html
- https://capec.mitre.org/data/definitions/43.html
- https://capec.mitre.org/data/definitions/45.html
- https://capec.mitre.org/data/definitions/46.html
- https://capec.mitre.org/data/definitions/47.html
- https://capec.mitre.org/data/definitions/473.html
- https://capec.mitre.org/data/definitions/52.html
- https://capec.mitre.org/data/definitions/53.html
- https://capec.mitre.org/data/definitions/588.html
- https://capec.mitre.org/data/definitions/63.html
- https://capec.mitre.org/data/definitions/64.html
- https://capec.mitre.org/data/definitions/664.html
- https://capec.mitre.org/data/definitions/67.html
- https://capec.mitre.org/data/definitions/7.html
- https://capec.mitre.org/data/definitions/71.html
- https://capec.mitre.org/data/definitions/72.html
- https://capec.mitre.org/data/definitions/73.html
- https://capec.mitre.org/data/definitions/78.html
- https://capec.mitre.org/data/definitions/79.html
- https://capec.mitre.org/data/definitions/8.html
- https://capec.mitre.org/data/definitions/80.html
- https://capec.mitre.org/data/definitions/81.html
- https://capec.mitre.org/data/definitions/83.html
- https://capec.mitre.org/data/definitions/85.html
- https://capec.mitre.org/data/definitions/88.html
- https://capec.mitre.org/data/definitions/9.html
- https://nvd.nist.gov/vuln/detail/CVE-2025-34118