Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-12812 | A vulnerability, which was classified as critical, was found in Wangshen SecGate 3600 2024. Affected is an unknown function of the file /?g=route_ispinfo_export_save. The manipulation of the argument file_name leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. |
Fri, 02 May 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 02 May 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Wangshen SecGate 3600 g=route_ispinfo_export_save path traversal | |
| Metrics |
cvssV4_0
|
cvssV3_0
|
Fri, 02 May 2025 00:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability, which was classified as critical, was found in Wangshen SecGate 3600 2024. Affected is an unknown function of the file /?g=route_ispinfo_export_save. The manipulation of the argument file_name leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV2_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-05-02T12:44:32.542Z
Reserved: 2025-05-01T12:48:34.037Z
Link: CVE-2025-4186
Updated: 2025-05-02T12:44:28.871Z
Status : Deferred
Published: 2025-05-02T00:15:19.233
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-4186
No data.
OpenCVE Enrichment
No data.
EUVD