Логотип exploitDog
bind:CVE-2025-34048
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-34048

Количество 3

Количество 3

nvd логотип

CVE-2025-34048

8 месяцев назад

A path traversal vulnerability exists in the web management interface of D-Link DSL-2730U, DSL-2750U, and DSL-2750E ADSL routers with firmware versions IN_1.02, SEA_1.04, and SEA_1.07. The vulnerability is due to insufficient input validation on the getpage parameter within the /cgi-bin/webproc CGI script. This flaw allows an unauthenticated remote attacker to perform path traversal attacks by supplying crafted requests, enabling arbitrary file read on the affected device. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-04 UTC.

EPSS: Низкий
github логотип

GHSA-4m2v-gmf9-56qj

8 месяцев назад

A path traversal vulnerability exists in the web management interface of D-Link DSL-2730U, DSL-2750U, and DSL-2750E ADSL routers with firmware versions IN_1.02, SEA_1.04, and SEA_1.07. The vulnerability is due to insufficient input validation on the getpage parameter within the /cgi-bin/webproc CGI script. This flaw allows an unauthenticated remote attacker to perform path traversal attacks by supplying crafted requests, enabling arbitrary file read on the affected device.

EPSS: Низкий
fstec логотип

BDU:2025-07926

больше 13 лет назад

Уязвимость веб-интерфейса управления микропрограммного обеспечения маршрутизаторов D-Link DSL-2730U, DSL-2750U и DSL-2750E, позволяющая нарушителю читать произвольные файлы

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-34048

A path traversal vulnerability exists in the web management interface of D-Link DSL-2730U, DSL-2750U, and DSL-2750E ADSL routers with firmware versions IN_1.02, SEA_1.04, and SEA_1.07. The vulnerability is due to insufficient input validation on the getpage parameter within the /cgi-bin/webproc CGI script. This flaw allows an unauthenticated remote attacker to perform path traversal attacks by supplying crafted requests, enabling arbitrary file read on the affected device. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-04 UTC.

0%
Низкий
8 месяцев назад
github логотип
GHSA-4m2v-gmf9-56qj

A path traversal vulnerability exists in the web management interface of D-Link DSL-2730U, DSL-2750U, and DSL-2750E ADSL routers with firmware versions IN_1.02, SEA_1.04, and SEA_1.07. The vulnerability is due to insufficient input validation on the getpage parameter within the /cgi-bin/webproc CGI script. This flaw allows an unauthenticated remote attacker to perform path traversal attacks by supplying crafted requests, enabling arbitrary file read on the affected device.

0%
Низкий
8 месяцев назад
fstec логотип
BDU:2025-07926

Уязвимость веб-интерфейса управления микропрограммного обеспечения маршрутизаторов D-Link DSL-2730U, DSL-2750U и DSL-2750E, позволяющая нарушителю читать произвольные файлы

CVSS3: 7.5
0%
Низкий
больше 13 лет назад

Уязвимостей на страницу