Path traversal vulnerability exists in FUJITSU Network...
Moderate severity
Unreviewed
Published
Jul 17, 2024
to the GitHub Advisory Database
•
Updated Sep 10, 2024
Description
Published by the National Vulnerability Database
Jul 17, 2024
Published to the GitHub Advisory Database
Jul 17, 2024
Last updated
Sep 10, 2024
Path traversal vulnerability exists in FUJITSU Network Edgiot GW1500 (M2M-GW for FENICS). If a remote authenticated attacker with User Class privilege sends a specially crafted request to the affected product, access restricted files containing sensitive information may be accessed. As a result, Administrator Class privileges of the product may be hijacked.
References