cve/2025/CVE-2025-22960.md
2025-09-29 21:09:30 +02:00

18 lines
1006 B
Markdown

### [CVE-2025-22960](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22960)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen)
### Description
A session hijacking vulnerability exists in the web-based management interface of GatesAir Maxiva UAXT, VAXT transmitters. Unauthenticated attackers can access exposed log files (/logs/debug/xteLog*), potentially revealing sensitive session-related information such as session IDs (sess_id) and authentication success tokens (user_check_password OK). Exploiting this flaw could allow attackers to hijack active sessions, gain unauthorized access, and escalate privileges on affected devices.
### POC
#### Reference
- https://github.com/shiky8/my--cve-vulnerability-research/tree/main/CVE-2025-22960
#### Github
No PoCs found on GitHub currently.