A remote file disclosure vulnerability exists in EasyCafe Server 2.2.14, exploitable by unauthenticated remote attackers via TCP port 831. The server listens for a custom protocol where opcode 0x43 can be used to request arbitrary files by absolute path. If the file exists and is accessible, its content is returned without authentication. This flaw allows attackers to retrieve sensitive files such as system configuration, password files, or application data.
Metrics
Affected Vendors & Products
References
History
Thu, 17 Jul 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 16 Jul 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A remote file disclosure vulnerability exists in EasyCafe Server 2.2.14, exploitable by unauthenticated remote attackers via TCP port 831. The server listens for a custom protocol where opcode 0x43 can be used to request arbitrary files by absolute path. If the file exists and is accessible, its content is returned without authentication. This flaw allows attackers to retrieve sensitive files such as system configuration, password files, or application data. | |
Title | EasyCafe Server 2.2.14 Remote File Disclosure via Opcode 0x43 | |
Weaknesses | CWE-306 CWE-668 |
|
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-07-16T21:04:35.633Z
Updated: 2025-07-17T19:59:53.850Z
Reserved: 2025-04-15T19:15:22.561Z
Link: CVE-2025-34119

Updated: 2025-07-17T19:59:45.621Z

Status : Awaiting Analysis
Published: 2025-07-16T21:15:26.827
Modified: 2025-07-17T21:15:50.197
Link: CVE-2025-34119

No data.