Directory traversal vulnerability in storage_cgi in GL.iNet GL-AR300M-Lite devices with firmware 2.27 allows remote attackers to have unspecified impact via directory traversal sequences.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/151207/GL-AR300M-Lite-2.2.7-Command-Injection-Directory-Traversal.html | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/46179/ | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/151207/GL-AR300M-Lite-2.2.7-Command-Injection-Directory-Traversal.html | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/46179/ | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:46
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/151207/GL-AR300M-Lite-2.2.7-Command-Injection-Directory-Traversal.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.exploit-db.com/exploits/46179/ - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2019-03-21 16:01
Updated : 2024-11-21 04:46
NVD link : CVE-2019-6274
Mitre link : CVE-2019-6274
CVE.ORG link : CVE-2019-6274
JSON object : View
Products Affected
gl-inet
- gl-ar300m-lite
- gl-ar300m-lite_firmware
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')