Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://www.abdulmhsblog.com/posts/sfx2100-vulns/ |
|
Mon, 09 Mar 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Datacast
Datacast sfx2100 Datacast sfx2100 Firmware |
|
| CPEs | cpe:2.3:h:datacast:sfx2100:-:*:*:*:*:*:*:* cpe:2.3:o:datacast:sfx2100_firmware:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Datacast
Datacast sfx2100 Datacast sfx2100 Firmware |
|
| Metrics |
cvssV3_1
|
Thu, 05 Mar 2026 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 05 Mar 2026 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 04 Mar 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
International Datacasting Corporation (idc)
International Datacasting Corporation (idc) sfx Series Superflex Satellite Receiver Web Management Interface |
|
| Vendors & Products |
International Datacasting Corporation (idc)
International Datacasting Corporation (idc) sfx Series Superflex Satellite Receiver Web Management Interface |
Wed, 04 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 04 Mar 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | LFI in /IDC_Logging/checkifdone.cgi, "file" parameter Allowing for File Existence Enumeration On IDC Satellite Receiver Web Management Interface Version 101 |
Wed, 04 Mar 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A path traversal vulnerability exists in the /IDC_Logging/checkifdone.cgi script in International Datacasting Corporation (IDC) SFX Series SuperFlex Satellite Receiver Web management portal version 101. An authenticated attacker can manipulate the `file` parameter to traverse directories and enumerate arbitrary files on the underlying filesystem. Due to the insecure perl file path handling function in use, a authenticated actor is able to preform directory traversal, with the backup endpoint confirming a file exists by indicating that a backup operation was successful or when using the path of a non existent file, the returned status is failed. | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Gridware
Published:
Updated: 2026-03-05T05:58:29.757Z
Reserved: 2026-03-03T09:59:08.425Z
Link: CVE-2026-28769
Updated: 2026-03-04T15:02:40.803Z
Status : Analyzed
Published: 2026-03-04T07:16:13.713
Modified: 2026-03-09T18:20:19.893
Link: CVE-2026-28769
No data.
OpenCVE Enrichment
Updated: 2026-04-16T14:00:19Z