Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-72j5-838x-5995

Опубликовано: 25 янв. 2022
Источник: github
Github: Не прошло ревью

Описание

A directory traversal vulnerability on Telos Z/IP One devices through 4.0.0r grants an unauthenticated individual root level access to the device's file system. This can be used to identify configuration settings, password hashes for built-in accounts, and the cleartext password for remote configuration of the device through the WebUI.

A directory traversal vulnerability on Telos Z/IP One devices through 4.0.0r grants an unauthenticated individual root level access to the device's file system. This can be used to identify configuration settings, password hashes for built-in accounts, and the cleartext password for remote configuration of the device through the WebUI.

EPSS

Процентиль: 91%
0.06292
Низкий

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 9.8
nvd
около 4 лет назад

A directory traversal vulnerability on Telos Z/IP One devices through 4.0.0r grants an unauthenticated individual root level access to the device's file system. This can be used to identify configuration settings, password hashes for built-in accounts, and the cleartext password for remote configuration of the device through the WebUI.

EPSS

Процентиль: 91%
0.06292
Низкий

Дефекты

CWE-22