MikroTik WinBox before 3.21 is vulnerable to a path traversal vulnerability that allows creation of arbitrary files wherevere WinBox has write permissions. WinBox is vulnerable to this attack if it connects to a malicious endpoint or if an attacker mounts a man in the middle attack.
References
Link | Resource |
---|---|
https://www.tenable.com/security/research/tra-2020-07 | Exploit Third Party Advisory |
https://www.tenable.com/security/research/tra-2020-07 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:34
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.tenable.com/security/research/tra-2020-07 - Exploit, Third Party Advisory |
Information
Published : 2020-02-06 17:15
Updated : 2024-11-21 05:34
NVD link : CVE-2020-5720
Mitre link : CVE-2020-5720
CVE.ORG link : CVE-2020-5720
JSON object : View
Products Affected
mikrotik
- winbox
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')