A remote file disclosure vulnerability exists in EasyCafe Server 2.2.14, exploitable by unauthenticated remote attackers via TCP port 831. The server listens for a custom protocol where opcode 0x43 can be used to request arbitrary files by absolute path. If the file exists and is accessible, its content is returned without authentication. This flaw allows attackers to retrieve sensitive files such as system configuration, password files, or application data.
History

Thu, 17 Jul 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 16 Jul 2025 21:15:00 +0000

Type Values Removed Values Added
Description A remote file disclosure vulnerability exists in EasyCafe Server 2.2.14, exploitable by unauthenticated remote attackers via TCP port 831. The server listens for a custom protocol where opcode 0x43 can be used to request arbitrary files by absolute path. If the file exists and is accessible, its content is returned without authentication. This flaw allows attackers to retrieve sensitive files such as system configuration, password files, or application data.
Title EasyCafe Server 2.2.14 Remote File Disclosure via Opcode 0x43
Weaknesses CWE-306
CWE-668
References
Metrics cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-07-16T21:04:35.633Z

Updated: 2025-07-17T19:59:53.850Z

Reserved: 2025-04-15T19:15:22.561Z

Link: CVE-2025-34119

cve-icon Vulnrichment

Updated: 2025-07-17T19:59:45.621Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-16T21:15:26.827

Modified: 2025-07-17T21:15:50.197

Link: CVE-2025-34119

cve-icon Redhat

No data.