CVE-2025-5160
low-risk
Published 2025-05-26
A vulnerability classified as problematic has been found in H3C SecCenter SMP-E1114P02 up to 20250513. Affected is the function Download of the file /packetCaptureStrategy/download. The manipulation of the argument Name leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Do I need to act?
~
1.0% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
4
CVSS 4.3/10
Medium
NETWORK
/ LOW complexity
Affected Products (1)
Seccenter Smp-1114P02
Affected Vendors
References (4)
Permissions Required
https://flowus.cn/share/3cec9266-793a-498e-acdb-4296b09a8c89?code=G8A6P3
Permissions Required
https://vuldb.com/?ctiid.310248
Third Party Advisory
https://vuldb.com/?id.310248
Third Party Advisory
https://vuldb.com/?submit.576232
26
/ 100
low-risk
Severity
18/34 · Moderate
Exploitability
3/34 · Minimal
Exposure
5/34 · Minimal