Issues were discovered in Open TFTP Server multithreaded 1.66 and Open TFTP Server single port 1.66. Due to insufficient access restrictions in the default installation directory, an attacker can elevate privileges by replacing the OpenTFTPServerMT.exe or the OpenTFTPServerSP.exe binary.
References
Link | Resource |
---|---|
https://github.com/OffensiveOceloot/advisories/blob/main/CVE-2020-26130.md | |
https://github.com/an0ry/advisories | Exploit Third Party Advisory |
https://sourceforge.net/projects/tftp-server/ | Product |
https://github.com/OffensiveOceloot/advisories/blob/main/CVE-2020-26130.md | |
https://github.com/an0ry/advisories | Exploit Third Party Advisory |
https://sourceforge.net/projects/tftp-server/ | Product |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:19
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/OffensiveOceloot/advisories/blob/main/CVE-2020-26130.md - | |
References | () https://github.com/an0ry/advisories - Exploit, Third Party Advisory | |
References | () https://sourceforge.net/projects/tftp-server/ - Product |
Information
Published : 2020-10-28 18:15
Updated : 2024-11-21 05:19
NVD link : CVE-2020-26130
Mitre link : CVE-2020-26130
CVE.ORG link : CVE-2020-26130
JSON object : View
Products Affected
open_tftp_server_project
- open_tftp_server
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource