First published: Tue Feb 04 2025(Updated: )
Multiple Western Telematic (WTI) products contain a web interface that is vulnerable to a local file inclusion attack (LFI), where any authenticated user has privileged access to files on the device's filesystem.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Western Telematic Inc Network Power Switch (NPS Series) | ||
Western Telematic Inc Network Power Switch (NPS Series) | ||
Western Telematic Inc Network Power Switch (NPS Series) | ||
Western Telematic Inc Network Power Switch (NPS Series) | ||
Western Telematic Inc Console Server (DSM Series) | ||
Western Telematic Inc Console Server + PDU Combo Unit (CPM Series) |
Western Telematic Inc reports this issue was discovered and patched in 2020. Western Telematic Inc recommends users follow best practices and update to the latest version. * For DSM/CPM units: Update to 8.06 https://ftp.wti.com/pub/TechSupport/Firmware_ARM/ * For NPS units: Update 4.02 https://ftp.wti.com/pub/TechSupport/Firmware_ARM/ * Ensure the default passwords are changed prior to deployment
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0630 is considered a high-severity vulnerability due to its potential for local file inclusion exploits that can compromise device security.
To fix CVE-2025-0630, update the firmware of Western Telematic NPS, DSM, or CPM series products to versions later than 6.62.
CVE-2025-0630 affects Western Telematic NPS, DSM, and CPM series products with firmware versions 6.62 and prior.
Yes, any authenticated user can exploit CVE-2025-0630 to access privileged files on the device's filesystem.
No, CVE-2025-0630 is a local file inclusion vulnerability, requiring authenticated access to exploit.