CVE-2025-6794

CRITICAL

CVSS v3

9.8

CRITICAL

EPSS Score

21.0%

exploit probability

CISA KEV

No

known exploited

Exploitation

SSVC status

Description

Marvell QConvergeConsole saveAsText Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Marvell QConvergeConsole. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the saveAsText method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage thi

Technical Details

CVSS v3 Vector
3.0
Published
7/7/2025
Last Modified
7/14/2025

Frequently Asked Questions

What is CVE-2025-6794?

Marvell QConvergeConsole saveAsText Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Marvell QConvergeConsole. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the saveAsText method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage thi

Is CVE-2025-6794 actively exploited?

Active exploitation of CVE-2025-6794 has not been confirmed. The EPSS score is 21.0%, indicating the estimated probability of exploitation in the next 30 days.

What is the CVSS score for CVE-2025-6794?

CVE-2025-6794 has a CVSS v3 base score of 9.8 (CRITICAL severity), with vector string 3.0.

Is CVE-2025-6794 affecting your environment?

Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.