CVE-2025-61666
HIGH EXPLOITED NUCLEITraccar <6.8.1-6.0 - Local File Inclusion
Title source: llmDescription
Traccar is an open source GPS tracking system. Default installs of Traccar on Windows between versions 6.1- 6.8.1 and non default installs between versions 5.8 - 6.0 are vulnerable to unauthenticated local file inclusion attacks which can lead to leakage of passwords or any file on the file system including the Traccar configuration file. Versions 5.8 - 6.0 are only vulnerable if <entry key='web.override'>./override</entry> is set in the configuration file. Versions 6.1 - 6.8.1 are vulnerable by default as the web override is enabled by default. The vulnerable code is removed in version 6.9.0.
Exploits (1)
github
WORKING POC
40 stars
by iSee857 · pythonpoc
https://github.com/iSee857/CVE-PoC/tree/main/Traccar-CVE-2025-61666-LocalFileInclusion.py
Nuclei Templates (1)
Traccar(Windows) 6.1- 6.8.1 - Local File Inclusion
HIGHVERIFIEDby securitytaters
Shodan:
html:"Traccar"
FOFA:
app="Traccar"
Scores
CVSS v4
8.7
EPSS
0.0136
EPSS Percentile
80.2%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:L/SI:L/SA:N
Details
VulnCheck KEV
2025-11-17
CWE
CWE-22
Status
published
Products (1)
traccar/traccar
>= 5.8, < 6.9.0
Published
Oct 02, 2025
Tracked Since
Feb 18, 2026