{"id":75981,"date":"2025-09-18T20:55:42","date_gmt":"2025-09-18T20:55:42","guid":{"rendered":""},"modified":"2025-11-02T02:09:46","modified_gmt":"2025-11-02T08:09:46","slug":"cve-2025-45583-incorrect-access-control-in-audi-utr-2-0-ftp-protocol","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2025-45583-incorrect-access-control-in-audi-utr-2-0-ftp-protocol\/","title":{"rendered":"<strong>CVE-2025-45583: Incorrect Access Control in Audi UTR 2.0 FTP Protocol<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>The CVE-2025-45583 vulnerability is a critical security flaw found in the FTP protocol of Audi UTR 2.0 Universal Traffic Recorder. This vulnerability allows potential attackers to authenticate into the FTP service using any combination of username and password, which exposes the system to a high risk of unauthorized access, system compromise, or data leakage.<br \/>\nAs a <a href=\"https:\/\/www.ameeba.com\/blog\/ameeba-announces-cybersecurity-internship-program\/\"  data-wpil-monitor-id=\"87686\">cybersecurity<\/a> concern that affects all users of the Audi UTR 2.0 Universal Traffic Recorder, it is crucial for all stakeholders to understand this vulnerability, its potential impact, and the steps for mitigation. In the wrong hands, this <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-9791-critical-vulnerability-in-tenda-ac20-16-03-08-05-leading-to-potential-system-compromise\/\"  data-wpil-monitor-id=\"85036\">vulnerability could lead<\/a> to significant damage, which makes its immediate resolution a top priority.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2025-45583<br \/>\nSeverity: Critical (9.1 CVSS Score)<br \/>\nAttack Vector: Network<br \/>\nPrivileges Required: None<br \/>\nUser Interaction: None<br \/>\nImpact: <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-0610-csrf-vulnerability-in-akinsoft-qr-menu-leading-to-potential-system-compromise\/\"  data-wpil-monitor-id=\"85201\">Potential system<\/a> compromise or data leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-3468890031\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p>Audi UTR 2.0 Universal Traffic Recorder | All versions<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The exploit works by taking advantage of the incorrect <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-28041-access-control-vulnerability-in-itranswarp-up-to-version-2-19\/\"  data-wpil-monitor-id=\"85980\">access control<\/a> in the FTP protocol of the Audi UTR 2.0 Universal Traffic Recorder. The <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-48581-critical-security-flaw-allowing-local-privilege-escalation-in-mainline-installations\/\"  data-wpil-monitor-id=\"87131\">flaw allows<\/a> an attacker, regardless of the credentials they use, to authenticate into the system. This is because the system does not correctly verify the authenticity of the presented <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-37103-hard-coded-login-credentials-vulnerability-in-hpe-networking-instant-on-access-points\/\"  data-wpil-monitor-id=\"92142\">credentials during the login<\/a> process. Consequently, malicious actors can gain unauthorized access to the system, <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-9253-stack-based-buffer-overflow-on-linksys-wi-fi-range-extenders-leading-to-potential-system-compromise\/\"  data-wpil-monitor-id=\"84239\">leading to potential system<\/a> compromise or data leakage.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-4082771427\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>Below is a conceptual representation of how this vulnerability might be exploited using an FTP client:<\/p>\n<pre><code class=\"\" data-line=\"\">ftp target.example.com\n&gt; User: any_username\n&gt; Password: any_password\n&gt; Login Successful<\/code><\/pre>\n<p>In this conceptual example, `any_username` and `any_password` represent any combination of username and password that an attacker might use. Despite the inaccuracy of these credentials, the system <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-52101-incorrect-access-control-vulnerability-in-linjiashop-0-9\/\"  data-wpil-monitor-id=\"92121\">incorrectly grants access<\/a>, thus demonstrating the vulnerability.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview The CVE-2025-45583 vulnerability is a critical security flaw found in the FTP protocol of Audi UTR 2.0 Universal Traffic Recorder. This vulnerability allows potential attackers to authenticate into the FTP service using any combination of username and password, which exposes the system to a high risk of unauthorized access, system compromise, or data leakage. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[],"product":[],"attack_vector":[],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-75981","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/75981","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=75981"}],"version-history":[{"count":8,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/75981\/revisions"}],"predecessor-version":[{"id":85353,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/75981\/revisions\/85353"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=75981"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=75981"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=75981"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=75981"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=75981"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=75981"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=75981"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=75981"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=75981"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}