5
CVSSv2

CVE-2020-25068

Published: 03/09/2020 Updated: 12/11/2020
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Setelsa Conacwin v3.7.1.2 is vulnerable to a local file inclusion vulnerability. This vulnerability allows a remote unauthenticated malicious user to read internal files on the server via an http:IP:PORT/../../path/file_to_disclose Directory Traversal URI. NOTE: The manufacturer indicated that the affected version does not exist. Furthermore, they indicated that they detected this problem in an internal audit more than 3 years ago and fixed it in 2017.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

setelsa-security conacwin 3.7.1.2

Github Repositories

Python script to exploit CVE-2020-25068.

CVE-2020-25068 Python exploit for Conacwin v3712 Setelsa Conacwin v3712 is vulnerable to a local file inclusion vulnerability This vulnerability allows a remote unauthenticated attacker to read internal files on the server via an http:IP:PORT///path/file_to_disclose Directory Traversal URI More references/info can be found at: cvemitreorg/cgi-bin/cvename