Описание
Path traversal vulnerability in ACERA 1320 firmware ver.01.26 and earlier, and ACERA 1310 firmware ver.01.26 and earlier allows a network-adjacent authenticated attacker to alter critical information such as system files by sending a specially crafted request. They are affected when running in ST(Standalone) mode.
Ссылки
- Third Party Advisory
- Vendor Advisory
- Third Party Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 01.26 (включая)
Одновременно
cpe:2.3:o:furunosystems:acera_1310_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:furunosystems:acera_1310:-:*:*:*:*:*:*:*
Конфигурация 2Версия до 01.26 (включая)
Одновременно
cpe:2.3:o:furunosystems:acera_1320_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:furunosystems:acera_1320:-:*:*:*:*:*:*:*
EPSS
Процентиль: 32%
0.00128
Низкий
5.7 Medium
CVSS3
Дефекты
CWE-22
Связанные уязвимости
CVSS3: 5.7
github
больше 2 лет назад
Path traversal vulnerability in ACERA 1320 firmware ver.01.26 and earlier, and ACERA 1310 firmware ver.01.26 and earlier allows a network-adjacent authenticated attacker to alter critical information such as system files by sending a specially crafted request. They are affected when running in ST(Standalone) mode.
EPSS
Процентиль: 32%
0.00128
Низкий
5.7 Medium
CVSS3
Дефекты
CWE-22