Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 04 Dec 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Mon, 17 Nov 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Advantech webaccess\/vpn
|
|
| CPEs | cpe:2.3:a:advantech:webaccess\/vpn:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Advantech webaccess\/vpn
|
Fri, 07 Nov 2025 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Advantech
Advantech webaccess/vpn |
|
| Vendors & Products |
Advantech
Advantech webaccess/vpn |
Thu, 06 Nov 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 06 Nov 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Advantech WebAccess/VPN versions prior to 1.1.5 contain an absolute path traversal via AjaxStandaloneVpnClientsController.ajaxDownloadRoadWarriorConfigFileAction() that allows an authenticated network administrator to cause the application to read and return the contents of arbitrary files the web user (www-data) can access. | |
| Title | Advantech WebAccess/VPN < 1.1.5 Path Traversal via AjaxStandaloneVpnClientsController.ajaxDownloadRoadWarriorConfigFileAction() | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-11-17T19:38:10.021Z
Reserved: 2025-04-15T19:15:22.575Z
Link: CVE-2025-34238
Updated: 2025-11-06T20:23:58.946Z
Status : Analyzed
Published: 2025-11-06T20:15:47.587
Modified: 2025-12-04T21:26:53.130
Link: CVE-2025-34238
No data.
OpenCVE Enrichment
Updated: 2025-11-07T10:54:10Z