CVE-2025-13315
CRITICAL EXPLOITED NUCLEITwonky Server Log Leak Authentication Bypass
Title source: metasploitDescription
Twonky Server 8.5.2 on Linux and Windows is vulnerable to an access control flaw. An unauthenticated attacker can bypass web service API authentication controls to leak a log file and read the administrator's username and encrypted password.
Exploits (2)
metasploit
WORKING POC
by remmons-r7 · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/gather/twonky_authbypass_logleak.rb
Nuclei Templates (1)
Twonky Server 8.5.2 on Linux and Windows - Log File Exposure
CRITICALVERIFIEDby pussycat0x
Scores
CVSS v3
9.8
EPSS
0.8237
EPSS Percentile
99.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitation Intel
VulnCheck KEV
2025-12-15
Classification
CWE
CWE-420
Status
published
Affected Products (1)
lynxtechnology/twonky_server
Timeline
Published
Nov 19, 2025
Tracked Since
Feb 18, 2026