7.5
CVSSv2

CVE-2019-3943

Published: 10/04/2019 Updated: 17/12/2019
CVSS v2 Base Score: 7.5 | Impact Score: 7.8 | Exploitability Score: 8
CVSS v3 Base Score: 8.1 | Impact Score: 5.2 | Exploitability Score: 2.8
VMScore: 668
Vector: AV:N/AC:L/Au:S/C:C/I:P/A:N

Vulnerability Summary

MikroTik RouterOS versions Stable 6.43.12 and below, Long-term 6.42.12 and below, and Testing 6.44beta75 and below are vulnerable to an authenticated, remote directory traversal via the HTTP or Winbox interfaces. An authenticated, remote attack can use this vulnerability to read and write files outside of the sandbox directory (/rw/disk).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

mikrotik routeros

mikrotik routeros 6.41

mikrotik routeros 6.42

mikrotik routeros 6.43

mikrotik routeros 6.44

Exploits

MikroTik RouterOS version 6456 DNS cache poisoning exploit ...

Github Repositories

_ _ ___ _ _ _ _ _|_|___| |_ ___ _ _ | | | | | | | | | | |_'_| | _|_ |_____|_|_|_|___|___|_,_| |_| |___| pywinbox A MikroTik's Winbox protocol honeypot pywinbox parses and understands Winbox communications log them and answer to them working as a medium interaction honeypot or