Skip to content

Marvell QConvergeConsole Path Traversal (CVE-2025-6793) Module#21322

Merged
dledda-r7 merged 6 commits into
rapid7:masterfrom
h4x-x0r:CVE-2025-6793
May 11, 2026
Merged

Marvell QConvergeConsole Path Traversal (CVE-2025-6793) Module#21322
dledda-r7 merged 6 commits into
rapid7:masterfrom
h4x-x0r:CVE-2025-6793

Conversation

@h4x-x0r
Copy link
Copy Markdown
Contributor

@h4x-x0r h4x-x0r commented Apr 16, 2026

This module exploits a path traversal vulnerability (CVE-2025-6793) in Marvell QConvergeConsole <= v5.5.0.85 to read arbitrary files from the system. No authentication is required to exploit this issue.
Note that whatever file is retrieved will be deleted from the server it was fetched from.

Verification Steps

  1. Download the installer from the vendor and deploy it with default settings.
  2. Start msfconsole
  3. msf > use auxiliary/gather/qconvergeconsole_traversal
  4. msf auxiliary(gather/qconvergeconsole_traversal) > set RHOSTS <IP>
  5. msf auxiliary(gather/qconvergeconsole_traversal) > run

Example output:

msf auxiliary(gather/qconvergeconsole_traversal) > exploit 
[*] Running module against 192.168.137.238
[*] Running automatic check ("set AutoCheck false" to disable)
[+] The target appears to be vulnerable. Vulnerable version detected: 5.0.78
[+] File retrieved: C:\Windows/win.ini
[*] File saved as loot: /home/asdf/.msf4/loot/20260416155543_default_192.168.137.238_qconvergeconsole_043853.ini
[*] Auxiliary module execution completed

msf auxiliary(gather/qconvergeconsole_traversal) > loot

Loot
====

host             service  type                   name     content                   info                                                                     path
----             -------  ----                   ----     -------                   ----                                                                     ----
192.168.137.238           qconvergeconsole.file  win.ini  application/octet-stream  File retrieved through QConvergeConsole path traversal (CVE-2025-6793).  /home/asdf/.msf4/loot/20260416155543_default_192.168.137.238_qconvergeconsole_043853.ini

Successfully tested on

  • Marvell QConvergeConsole v5.5.0.78 on Windows 22H2
  • Marvell QConvergeConsole v5.5.0.81 on Windows 22H2

Comment thread modules/auxiliary/gather/qconvergeconsole_traversal.rb Outdated
Comment thread modules/auxiliary/gather/qconvergeconsole_traversal.rb
Comment thread modules/auxiliary/gather/qconvergeconsole_traversal.rb Outdated
Comment thread modules/auxiliary/gather/qconvergeconsole_traversal.rb
@dledda-r7 dledda-r7 self-assigned this Apr 27, 2026
@dledda-r7 dledda-r7 moved this from Todo to Waiting on Contributor in Metasploit Kanban Apr 29, 2026
@dledda-r7
Copy link
Copy Markdown
Contributor

Hello @h4x-x0r ! i have set up the target and i am going to test it soon, also i'll try to investigate the two open questions: msftidy_docs for the long link and vars_get. Cheers!

strong_name = res.body.match(/Sb='([A-Fa-f0-9]{32})'/)&.captures&.first
strong_name ||= res.body.match(/([A-Fa-f0-9]{32})\.cache\.html/)&.captures&.first

return Exploit::CheckCode::Unknown('Could not determine GWT strong name') unless strong_name
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

maybe detected here?

@h4x-x0r
Copy link
Copy Markdown
Contributor Author

h4x-x0r commented May 7, 2026

@dledda-r7 Were you able to replicate the module in your test environment? Do you have any feedback that I can address before the module can get merged?

Copy link
Copy Markdown
Contributor

@dledda-r7 dledda-r7 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

msf auxiliary(gather/qconvergeconsole_traversal) > run
[*] Running module against 10.5.135.134
[*] Running automatic check ("set AutoCheck false" to disable)
[+] The target appears to be vulnerable. Vulnerable version detected: 5.0.78
[+] File retrieved: C:\Windows/win.ini
[*] File saved as loot: /home/kali/.msf4/loot/20260508114551_default_10.5.135.134_qconvergeconsole_548615.ini
[*] Auxiliary module execution completed
msf auxiliary(gather/qconvergeconsole_traversal) > 

@github-project-automation github-project-automation Bot moved this from Waiting on Contributor to In Progress in Metasploit Kanban May 8, 2026
@dledda-r7
Copy link
Copy Markdown
Contributor

@dledda-r7 Were you able to replicate the module in your test environment? Do you have any feedback that I can address before the module can get merged?

Hello @h4x-x0r I think we are good :)

Copy link
Copy Markdown
Contributor

@dledda-r7 dledda-r7 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

just the check method. let me know if it makes sense to you

Comment thread modules/auxiliary/gather/qconvergeconsole_traversal.rb Outdated
Comment thread modules/auxiliary/gather/qconvergeconsole_traversal.rb Outdated
Comment thread modules/auxiliary/gather/qconvergeconsole_traversal.rb Outdated
Comment thread modules/auxiliary/gather/qconvergeconsole_traversal.rb Outdated
@dledda-r7 dledda-r7 merged commit 7d62e9f into rapid7:master May 11, 2026
18 checks passed
@github-project-automation github-project-automation Bot moved this from In Progress to Done in Metasploit Kanban May 11, 2026
@h4x-x0r
Copy link
Copy Markdown
Contributor Author

h4x-x0r commented May 12, 2026

@dledda-r7 Sorry I wasn't able to get back to you earlier. I saw you already merged it, thank you!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

Status: Done

Development

Successfully merging this pull request may close these issues.

5 participants