CVE-2020-5720

MikroTik WinBox before 3.21 is vulnerable to a path traversal vulnerability that allows creation of arbitrary files wherevere WinBox has write permissions. WinBox is vulnerable to this attack if it connects to a malicious endpoint or if an attacker mounts a man in the middle attack.
References
Link Resource
https://www.tenable.com/security/research/tra-2020-07 Exploit Third Party Advisory
https://www.tenable.com/security/research/tra-2020-07 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:o:mikrotik:winbox:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:34

Type Values Removed Values Added
References () https://www.tenable.com/security/research/tra-2020-07 - Exploit, Third Party Advisory () https://www.tenable.com/security/research/tra-2020-07 - Exploit, Third Party Advisory

Information

Published : 2020-02-06 17:15

Updated : 2024-11-21 05:34


NVD link : CVE-2020-5720

Mitre link : CVE-2020-5720

CVE.ORG link : CVE-2020-5720


JSON object : View

Products Affected

mikrotik

  • winbox
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')