AVM KEN! 1.3.10 Directory Traversal...

- AV AC AU C I A
发布: 2000-04-12
修订: 2025-04-13

A remote user on the local network is capable of retrieving any known file from a machine running AVM KEN!. This is accomplished by appending ../ to a URL utilizing port 3128 to escape the regular web file structure, and appending the remaining path onto the request. eg. http://target:3128/../../../filename.ext A denial of service attack could also be launched against AVM KEN! by sending random characters to port 3128. A restart would be required in order to regain normal functionality.

0%
暂无可用Exp或PoC
当前有0条受影响产品信息