Логотип exploitDog
bind:CVE-2022-29332
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-29332

Количество 2

Количество 2

nvd логотип

CVE-2022-29332

больше 3 лет назад

D-LINK DIR-825 AC1200 R2 is vulnerable to Directory Traversal. An attacker could use the "../../../../" setting of the FTP server folder to set the router's root folder for FTP access. This allows you to access the entire router file system via the FTP server.

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-j37r-7f58-pm68

больше 3 лет назад

D-LINK DIR-825 AC1200 R2 is vulnerable to Directory Traversal. An attacker could use the "../../../../" setting of the FTP server folder to set the router's root folder for FTP access. This allows you to access the entire router file system via the FTP server.

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-29332

D-LINK DIR-825 AC1200 R2 is vulnerable to Directory Traversal. An attacker could use the "../../../../" setting of the FTP server folder to set the router's root folder for FTP access. This allows you to access the entire router file system via the FTP server.

CVSS3: 6.5
1%
Низкий
больше 3 лет назад
github логотип
GHSA-j37r-7f58-pm68

D-LINK DIR-825 AC1200 R2 is vulnerable to Directory Traversal. An attacker could use the "../../../../" setting of the FTP server folder to set the router's root folder for FTP access. This allows you to access the entire router file system via the FTP server.

CVSS3: 6.5
1%
Низкий
больше 3 лет назад

Уязвимостей на страницу