Description
A directory traversal vulnerability exists in the server.js start functionality of Milesight VPN v2.0.2. A specially-crafted network request can lead to arbitrary file read. An attacker can send a network request to trigger this vulnerability.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-27990 | A directory traversal vulnerability exists in the server.js start functionality of Milesight VPN v2.0.2. A specially-crafted network request can lead to arbitrary file read. An attacker can send a network request to trigger this vulnerability. |
References
History
No history.
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2024-08-02T10:42:27.095Z
Reserved: 2023-01-20T17:46:16.436Z
Link: CVE-2023-23907
Updated: 2024-07-31T20:15:33.943Z
Status : Modified
Published: 2023-07-06T15:15:11.723
Modified: 2024-11-21T07:47:04.487
Link: CVE-2023-23907
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD