header-logo
Suggest Exploit
vendor:
FM114P Wireless Firewall
by:
SecurityFocus
8.8
CVSS
HIGH
Directory Traversal
22
CWE
Product Name: FM114P Wireless Firewall
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: CVE-2002-0674
CPE: h:netgear:fm114p
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2002

Netgear FM114P Wireless Firewalls Directory Traversal

Netgear FM114P Wireless Firewalls are vulnerable to directory traversal attacks. An unauthenticated user can escape from the /upnp/service directory and retrieve the firewall's configuration file by sending a specially crafted HTTP request to the vulnerable device.

Mitigation:

Upgrade to the latest version of the Netgear FM114P Wireless Firewall.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/6807/info

Netgear FM114P Wireless Firewalls allow directory traversal using escaped character sequences. It is possible for an unauthenticated user to retrieve the firewall's configuration file by escaping from the /upnp/service directory.

http://<ip-or-hostname>:<port>/upnp/service/%2e%2e%2fnetgear.cfg