Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5cpf-pp9h-vpgm

Опубликовано: 01 авг. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 6.9

Описание

A directory traversal vulnerability exists in Linksys router's web interface (tested on the E1500 model firmware versions 1.0.00, 1.0.04, and 1.0.05), specifically in the /apply.cgi endpoint. Authenticated attackers can exploit the next_page POST parameter to access arbitrary files outside the intended web root by injecting traversal sequences. This allows exposure of sensitive system files and configuration data.

A directory traversal vulnerability exists in Linksys router's web interface (tested on the E1500 model firmware versions 1.0.00, 1.0.04, and 1.0.05), specifically in the /apply.cgi endpoint. Authenticated attackers can exploit the next_page POST parameter to access arbitrary files outside the intended web root by injecting traversal sequences. This allows exposure of sensitive system files and configuration data.

EPSS

Процентиль: 97%
0.42709
Средний

6.9 Medium

CVSS4

Дефекты

CWE-22

Связанные уязвимости

nvd
6 месяцев назад

A directory traversal vulnerability exists in Linksys router's web interface (tested on the E1500 model firmware versions 1.0.00, 1.0.04, and 1.0.05), specifically in the /apply.cgi endpoint. Authenticated attackers can exploit the next_page POST parameter to access arbitrary files outside the intended web root by injecting traversal sequences. This allows exposure of sensitive system files and configuration data.

CVSS3: 4.9
fstec
больше 13 лет назад

Уязвимость сценария apply.cgi микропрограммного обеспечения маршрутизаторов Linksys E1500 и E2500, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 97%
0.42709
Средний

6.9 Medium

CVSS4

Дефекты

CWE-22