Directory traversal vulnerability in storage_cgi in GL.iNet GL-AR300M-Lite devices with firmware 2.27 allows remote attackers to have unspecified impact via directory traversal sequences.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/151207/GL-AR300M-Lite-2.2.7-Command-Injection-Directory-Traversal.html | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/46179/ | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2019-03-21 16:01
Updated : 2024-02-28 17:08
NVD link : CVE-2019-6274
Mitre link : CVE-2019-6274
CVE.ORG link : CVE-2019-6274
JSON object : View
Products Affected
gl-inet
- gl-ar300m-lite_firmware
- gl-ar300m-lite
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')