Directory Traversal vulnerability in app_data_center on Shenzhen Tenda Ac9 US_AC9V1.0BR_V15.03.05.14_multi_TD01, Ac9 ac9_kf_V15.03.05.19(6318_)_cn, Ac15 US_AC15V1.0BR_V15.03.05.18_multi_TD01, Ac15 US_AC15V1.0BR_V15.03.05.19_multi_TD01, Ac18 US_AC18V1.0BR_V15.03.05.05_multi_TD01, and Ac18 ac18_kf_V15.03.05.19(6318_)_cn devices allows remote unauthenticated malicious users to read arbitrary files via a cgi-bin/luci/request?op=1&path= URI that uses directory traversal sequences after a /usb/ substring.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
tenda ac9_firmware us_ac9v1.0br_v15.03.05.14_multi_td01 |
||
tenda ac9_firmware ac9_kf_v15.03.05.19\\(6318_\\)_cn |
||
tenda ac15_firmware us_ac15v1.0br_v15.03.05.18_multi_td01 |
||
tenda ac15_firmware us_ac15v1.0br_v15.03.05.19_multi_td01 |
||
tenda ac18_firmware us_ac18v1.0br_v15.03.05.05_multi_td01 |
||
tenda ac18_firmware ac18_kf_v15.03.05.19\\(6318_\\)_cn |