Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2015-3035

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-17 Apr, 2015 | 18:00
Updated At-21 Oct, 2025 | 23:56
Rejected At-
Credits

TP-Link Multiple Archer Devices Directory Traversal Vulnerability

Directory traversal vulnerability in multiple TP-Link Archer devices allows remote attackers to read arbitrary files via a .. (dot dot) in the PATH_INFO to login/.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Known Exploited Vulnerabilities (KEV)
cisa.gov
Vendor:
TP-Link Systems Inc.TP-Link
Product:Multiple Archer Devices
Added At:25 Mar, 2022
Due At:15 Apr, 2022

TP-Link Multiple Archer Devices Directory Traversal Vulnerability

Directory traversal vulnerability in multiple TP-Link Archer devices allows remote attackers to read arbitrary files via a .. (dot dot) in the PATH_INFO to login/.

Used in Ransomware

:

Unknown

CWE

:
CWE-22

Required Action:

Apply updates per vendor instructions.

Additional Notes:

https://nvd.nist.gov/vuln/detail/CVE-2015-3035
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:17 Apr, 2015 | 18:00
Updated At:21 Oct, 2025 | 23:56
Rejected At:
â–¼CVE Numbering Authority (CNA)

Directory traversal vulnerability in TP-LINK Archer C5 (1.2) with firmware before 150317, C7 (2.0) with firmware before 150304, and C8 (1.0) with firmware before 150316, Archer C9 (1.0), TL-WDR3500 (1.0), TL-WDR3600 (1.0), and TL-WDR4300 (1.0) with firmware before 150302, TL-WR740N (5.0) and TL-WR741ND (5.0) with firmware before 150312, and TL-WR841N (9.0), TL-WR841N (10.0), TL-WR841ND (9.0), and TL-WR841ND (10.0) with firmware before 150310 allows remote attackers to read arbitrary files via a .. (dot dot) in the PATH_INFO to login/.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.tp-link.com/en/download/Archer-C9_V1.html#Firmware
x_refsource_CONFIRM
http://www.tp-link.com/en/download/Archer-C7_V2.html#Firmware
x_refsource_CONFIRM
http://www.tp-link.com/en/download/TL-WR740N_V5.html#Firmware
x_refsource_CONFIRM
http://www.tp-link.com/en/download/Archer-C5_V1.20.html#Firmware
x_refsource_CONFIRM
http://packetstormsecurity.com/files/131378/TP-LINK-Local-File-Disclosure.html
x_refsource_MISC
http://www.tp-link.com/en/download/TL-WR841N_V9.html#Firmware
x_refsource_CONFIRM
http://www.tp-link.com/en/download/TL-WR841ND_V9.html#Firmware
x_refsource_CONFIRM
http://seclists.org/fulldisclosure/2015/Apr/26
mailing-list
x_refsource_FULLDISC
http://www.tp-link.com/en/download/TL-WDR3600_V1.html#Firmware
x_refsource_CONFIRM
http://www.tp-link.com/en/download/TL-WDR3500_V1.html#Firmware
x_refsource_CONFIRM
http://www.securityfocus.com/bid/74050
vdb-entry
x_refsource_BID
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20150410-0_TP-Link_Unauthenticated_local_file_disclosure_vulnerability_v10.txt
x_refsource_MISC
http://www.tp-link.com/en/download/TL-WR741ND_V5.html#Firmware
x_refsource_CONFIRM
http://www.tp-link.com/en/download/Archer-C8_V1.html#Firmware
x_refsource_CONFIRM
http://www.tp-link.com/en/download/TL-WDR4300_V1.html#Firmware
x_refsource_CONFIRM
http://www.securityfocus.com/archive/1/535240/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://www.tp-link.com/en/download/Archer-C9_V1.html#Firmware
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.tp-link.com/en/download/Archer-C7_V2.html#Firmware
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.tp-link.com/en/download/TL-WR740N_V5.html#Firmware
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.tp-link.com/en/download/Archer-C5_V1.20.html#Firmware
Resource:
x_refsource_CONFIRM
Hyperlink: http://packetstormsecurity.com/files/131378/TP-LINK-Local-File-Disclosure.html
Resource:
x_refsource_MISC
Hyperlink: http://www.tp-link.com/en/download/TL-WR841N_V9.html#Firmware
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.tp-link.com/en/download/TL-WR841ND_V9.html#Firmware
Resource:
x_refsource_CONFIRM
Hyperlink: http://seclists.org/fulldisclosure/2015/Apr/26
Resource:
mailing-list
x_refsource_FULLDISC
Hyperlink: http://www.tp-link.com/en/download/TL-WDR3600_V1.html#Firmware
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.tp-link.com/en/download/TL-WDR3500_V1.html#Firmware
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securityfocus.com/bid/74050
Resource:
vdb-entry
x_refsource_BID
Hyperlink: https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20150410-0_TP-Link_Unauthenticated_local_file_disclosure_vulnerability_v10.txt
Resource:
x_refsource_MISC
Hyperlink: http://www.tp-link.com/en/download/TL-WR741ND_V5.html#Firmware
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.tp-link.com/en/download/Archer-C8_V1.html#Firmware
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.tp-link.com/en/download/TL-WDR4300_V1.html#Firmware
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securityfocus.com/archive/1/535240/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
â–¼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.tp-link.com/en/download/Archer-C9_V1.html#Firmware
x_refsource_CONFIRM
x_transferred
http://www.tp-link.com/en/download/Archer-C7_V2.html#Firmware
x_refsource_CONFIRM
x_transferred
http://www.tp-link.com/en/download/TL-WR740N_V5.html#Firmware
x_refsource_CONFIRM
x_transferred
http://www.tp-link.com/en/download/Archer-C5_V1.20.html#Firmware
x_refsource_CONFIRM
x_transferred
http://packetstormsecurity.com/files/131378/TP-LINK-Local-File-Disclosure.html
x_refsource_MISC
x_transferred
http://www.tp-link.com/en/download/TL-WR841N_V9.html#Firmware
x_refsource_CONFIRM
x_transferred
http://www.tp-link.com/en/download/TL-WR841ND_V9.html#Firmware
x_refsource_CONFIRM
x_transferred
http://seclists.org/fulldisclosure/2015/Apr/26
mailing-list
x_refsource_FULLDISC
x_transferred
http://www.tp-link.com/en/download/TL-WDR3600_V1.html#Firmware
x_refsource_CONFIRM
x_transferred
http://www.tp-link.com/en/download/TL-WDR3500_V1.html#Firmware
x_refsource_CONFIRM
x_transferred
http://www.securityfocus.com/bid/74050
vdb-entry
x_refsource_BID
x_transferred
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20150410-0_TP-Link_Unauthenticated_local_file_disclosure_vulnerability_v10.txt
x_refsource_MISC
x_transferred
http://www.tp-link.com/en/download/TL-WR741ND_V5.html#Firmware
x_refsource_CONFIRM
x_transferred
http://www.tp-link.com/en/download/Archer-C8_V1.html#Firmware
x_refsource_CONFIRM
x_transferred
http://www.tp-link.com/en/download/TL-WDR4300_V1.html#Firmware
x_refsource_CONFIRM
x_transferred
http://www.securityfocus.com/archive/1/535240/100/0/threaded
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://www.tp-link.com/en/download/Archer-C9_V1.html#Firmware
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.tp-link.com/en/download/Archer-C7_V2.html#Firmware
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.tp-link.com/en/download/TL-WR740N_V5.html#Firmware
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.tp-link.com/en/download/Archer-C5_V1.20.html#Firmware
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://packetstormsecurity.com/files/131378/TP-LINK-Local-File-Disclosure.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.tp-link.com/en/download/TL-WR841N_V9.html#Firmware
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.tp-link.com/en/download/TL-WR841ND_V9.html#Firmware
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://seclists.org/fulldisclosure/2015/Apr/26
Resource:
mailing-list
x_refsource_FULLDISC
x_transferred
Hyperlink: http://www.tp-link.com/en/download/TL-WDR3600_V1.html#Firmware
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.tp-link.com/en/download/TL-WDR3500_V1.html#Firmware
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securityfocus.com/bid/74050
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20150410-0_TP-Link_Unauthenticated_local_file_disclosure_vulnerability_v10.txt
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.tp-link.com/en/download/TL-WR741ND_V5.html#Firmware
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.tp-link.com/en/download/Archer-C8_V1.html#Firmware
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.tp-link.com/en/download/TL-WDR4300_V1.html#Firmware
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/535240/100/0/threaded
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-22CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Type: CWE
CWE ID: CWE-22
Description: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Metrics
VersionBase scoreBase severityVector
3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Metrics Other Info
kev
dateAdded:
2022-03-25
reference:
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2015-3035
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
CVE-2015-3035 added to CISA KEV2022-03-25 00:00:00
Event: CVE-2015-3035 added to CISA KEV
Date: 2022-03-25 00:00:00
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2015-3035
government-resource
Hyperlink: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2015-3035
Resource:
government-resource
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:22 Apr, 2015 | 01:59
Updated At:21 Apr, 2026 | 17:05

Directory traversal vulnerability in TP-LINK Archer C5 (1.2) with firmware before 150317, C7 (2.0) with firmware before 150304, and C8 (1.0) with firmware before 150316, Archer C9 (1.0), TL-WDR3500 (1.0), TL-WDR3600 (1.0), and TL-WDR4300 (1.0) with firmware before 150302, TL-WR740N (5.0) and TL-WR741ND (5.0) with firmware before 150312, and TL-WR841N (9.0), TL-WR841N (10.0), TL-WR841ND (9.0), and TL-WR841ND (10.0) with firmware before 150310 allows remote attackers to read arbitrary files via a .. (dot dot) in the PATH_INFO to login/.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
2022-03-252022-04-15TP-Link Multiple Archer Devices Directory Traversal VulnerabilityApply updates per vendor instructions.
Date Added: 2022-03-25
Due Date: 2022-04-15
Vulnerability Name: TP-Link Multiple Archer Devices Directory Traversal Vulnerability
Required Action: Apply updates per vendor instructions.
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Secondary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Primary2.07.8HIGH
AV:N/AC:L/Au:N/C:C/I:N/A:N
Type: Primary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Type: Primary
Version: 2.0
Base score: 7.8
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:C/I:N/A:N
CPE Matches

TP-Link Systems Inc.
tp-link
>>tl-wr741nd_firmware>>Versions before 150312(exclusive)
cpe:2.3:o:tp-link:tl-wr741nd_firmware:*:*:*:*:*:*:*:*
TP-Link Systems Inc.
tp-link
>>tl-wr741nd>>5
cpe:2.3:h:tp-link:tl-wr741nd:5:*:*:*:*:*:*:*
TP-Link Systems Inc.
tp-link
>>tl-wr841n_firmware>>Versions before 150310(exclusive)
cpe:2.3:o:tp-link:tl-wr841n_firmware:*:*:*:*:*:*:*:*
TP-Link Systems Inc.
tp-link
>>tl-wr841n>>9
cpe:2.3:h:tp-link:tl-wr841n:9:*:*:*:*:*:*:*
TP-Link Systems Inc.
tp-link
>>tl-wr740n_firmware>>Versions before 150312(exclusive)
cpe:2.3:o:tp-link:tl-wr740n_firmware:*:*:*:*:*:*:*:*
TP-Link Systems Inc.
tp-link
>>tl-wr740n>>5
cpe:2.3:h:tp-link:tl-wr740n:5:*:*:*:*:*:*:*
TP-Link Systems Inc.
tp-link
>>archer_c5_firmware>>Versions before 150317(exclusive)
cpe:2.3:o:tp-link:archer_c5_firmware:*:*:*:*:*:*:*:*
TP-Link Systems Inc.
tp-link
>>archer_c5>>1.20
cpe:2.3:h:tp-link:archer_c5:1.20:*:*:*:*:*:*:*
TP-Link Systems Inc.
tp-link
>>tl-wr841n_firmware>>Versions before 150310(exclusive)
cpe:2.3:o:tp-link:tl-wr841n_firmware:*:*:*:*:*:*:*:*
TP-Link Systems Inc.
tp-link
>>tl-wr841n>>10
cpe:2.3:h:tp-link:tl-wr841n:10:*:*:*:*:*:*:*
TP-Link Systems Inc.
tp-link
>>tl-wdr3600_firmware>>Versions before 150302(exclusive)
cpe:2.3:o:tp-link:tl-wdr3600_firmware:*:*:*:*:*:*:*:*
TP-Link Systems Inc.
tp-link
>>tl-wdr3600>>1
cpe:2.3:h:tp-link:tl-wdr3600:1:*:*:*:*:*:*:*
TP-Link Systems Inc.
tp-link
>>archer_c7_firmware>>Versions before 150304(exclusive)
cpe:2.3:o:tp-link:archer_c7_firmware:*:*:*:*:*:*:*:*
TP-Link Systems Inc.
tp-link
>>archer_c7>>2
cpe:2.3:h:tp-link:archer_c7:2:*:*:*:*:*:*:*
TP-Link Systems Inc.
tp-link
>>tl-wr841nd_firmware>>Versions before 150310(exclusive)
cpe:2.3:o:tp-link:tl-wr841nd_firmware:*:*:*:*:*:*:*:*
TP-Link Systems Inc.
tp-link
>>tl-wr841nd>>10
cpe:2.3:h:tp-link:tl-wr841nd:10:*:*:*:*:*:*:*
TP-Link Systems Inc.
tp-link
>>archer_c9_firmware>>Versions before 150302(exclusive)
cpe:2.3:o:tp-link:archer_c9_firmware:*:*:*:*:*:*:*:*
TP-Link Systems Inc.
tp-link
>>archer_c9>>1
cpe:2.3:h:tp-link:archer_c9:1:*:*:*:*:*:*:*
TP-Link Systems Inc.
tp-link
>>tl-wr841nd_firmware>>Versions before 150310(exclusive)
cpe:2.3:o:tp-link:tl-wr841nd_firmware:*:*:*:*:*:*:*:*
TP-Link Systems Inc.
tp-link
>>tl-wr841nd>>9
cpe:2.3:h:tp-link:tl-wr841nd:9:*:*:*:*:*:*:*
TP-Link Systems Inc.
tp-link
>>archer_c8_firmware>>Versions before 150316(exclusive)
cpe:2.3:o:tp-link:archer_c8_firmware:*:*:*:*:*:*:*:*
TP-Link Systems Inc.
tp-link
>>archer_c8>>1
cpe:2.3:h:tp-link:archer_c8:1:*:*:*:*:*:*:*
TP-Link Systems Inc.
tp-link
>>tl-wdr4300_firmware>>Versions before 150302(exclusive)
cpe:2.3:o:tp-link:tl-wdr4300_firmware:*:*:*:*:*:*:*:*
TP-Link Systems Inc.
tp-link
>>tl-wdr4300>>1
cpe:2.3:h:tp-link:tl-wdr4300:1:*:*:*:*:*:*:*
TP-Link Systems Inc.
tp-link
>>tl-wdr3500_firmware>>Versions before 150302(exclusive)
cpe:2.3:o:tp-link:tl-wdr3500_firmware:*:*:*:*:*:*:*:*
TP-Link Systems Inc.
tp-link
>>tl-wdr3500>>1
cpe:2.3:h:tp-link:tl-wdr3500:1:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-22Primarynvd@nist.gov
CWE-22Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-22
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-22
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://packetstormsecurity.com/files/131378/TP-LINK-Local-File-Disclosure.htmlcve@mitre.org
Exploit
Third Party Advisory
VDB Entry
http://seclists.org/fulldisclosure/2015/Apr/26cve@mitre.org
Exploit
Mailing List
Third Party Advisory
http://www.securityfocus.com/archive/1/535240/100/0/threadedcve@mitre.org
Broken Link
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/74050cve@mitre.org
Broken Link
Third Party Advisory
VDB Entry
http://www.tp-link.com/en/download/Archer-C5_V1.20.html#Firmwarecve@mitre.org
Product
http://www.tp-link.com/en/download/Archer-C7_V2.html#Firmwarecve@mitre.org
Product
http://www.tp-link.com/en/download/Archer-C8_V1.html#Firmwarecve@mitre.org
Product
http://www.tp-link.com/en/download/Archer-C9_V1.html#Firmwarecve@mitre.org
Product
http://www.tp-link.com/en/download/TL-WDR3500_V1.html#Firmwarecve@mitre.org
Product
http://www.tp-link.com/en/download/TL-WDR3600_V1.html#Firmwarecve@mitre.org
Product
http://www.tp-link.com/en/download/TL-WDR4300_V1.html#Firmwarecve@mitre.org
Product
http://www.tp-link.com/en/download/TL-WR740N_V5.html#Firmwarecve@mitre.org
Product
http://www.tp-link.com/en/download/TL-WR741ND_V5.html#Firmwarecve@mitre.org
Product
http://www.tp-link.com/en/download/TL-WR841ND_V9.html#Firmwarecve@mitre.org
Product
http://www.tp-link.com/en/download/TL-WR841N_V9.html#Firmwarecve@mitre.org
Product
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20150410-0_TP-Link_Unauthenticated_local_file_disclosure_vulnerability_v10.txtcve@mitre.org
Exploit
Not Applicable
http://packetstormsecurity.com/files/131378/TP-LINK-Local-File-Disclosure.htmlaf854a3a-2127-422b-91ae-364da2661108
Exploit
Third Party Advisory
VDB Entry
http://seclists.org/fulldisclosure/2015/Apr/26af854a3a-2127-422b-91ae-364da2661108
Exploit
Mailing List
Third Party Advisory
http://www.securityfocus.com/archive/1/535240/100/0/threadedaf854a3a-2127-422b-91ae-364da2661108
Broken Link
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/74050af854a3a-2127-422b-91ae-364da2661108
Broken Link
Third Party Advisory
VDB Entry
http://www.tp-link.com/en/download/Archer-C5_V1.20.html#Firmwareaf854a3a-2127-422b-91ae-364da2661108
Product
http://www.tp-link.com/en/download/Archer-C7_V2.html#Firmwareaf854a3a-2127-422b-91ae-364da2661108
Product
http://www.tp-link.com/en/download/Archer-C8_V1.html#Firmwareaf854a3a-2127-422b-91ae-364da2661108
Product
http://www.tp-link.com/en/download/Archer-C9_V1.html#Firmwareaf854a3a-2127-422b-91ae-364da2661108
Product
http://www.tp-link.com/en/download/TL-WDR3500_V1.html#Firmwareaf854a3a-2127-422b-91ae-364da2661108
Product
http://www.tp-link.com/en/download/TL-WDR3600_V1.html#Firmwareaf854a3a-2127-422b-91ae-364da2661108
Product
http://www.tp-link.com/en/download/TL-WDR4300_V1.html#Firmwareaf854a3a-2127-422b-91ae-364da2661108
Product
http://www.tp-link.com/en/download/TL-WR740N_V5.html#Firmwareaf854a3a-2127-422b-91ae-364da2661108
Product
http://www.tp-link.com/en/download/TL-WR741ND_V5.html#Firmwareaf854a3a-2127-422b-91ae-364da2661108
Product
http://www.tp-link.com/en/download/TL-WR841ND_V9.html#Firmwareaf854a3a-2127-422b-91ae-364da2661108
Product
http://www.tp-link.com/en/download/TL-WR841N_V9.html#Firmwareaf854a3a-2127-422b-91ae-364da2661108
Product
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20150410-0_TP-Link_Unauthenticated_local_file_disclosure_vulnerability_v10.txtaf854a3a-2127-422b-91ae-364da2661108
Exploit
Not Applicable
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2015-3035134c704f-9b21-4f2e-91b3-4a467353bcc0
US Government Resource
Hyperlink: http://packetstormsecurity.com/files/131378/TP-LINK-Local-File-Disclosure.html
Source: cve@mitre.org
Resource:
Exploit
Third Party Advisory
VDB Entry
Hyperlink: http://seclists.org/fulldisclosure/2015/Apr/26
Source: cve@mitre.org
Resource:
Exploit
Mailing List
Third Party Advisory
Hyperlink: http://www.securityfocus.com/archive/1/535240/100/0/threaded
Source: cve@mitre.org
Resource:
Broken Link
Third Party Advisory
VDB Entry
Hyperlink: http://www.securityfocus.com/bid/74050
Source: cve@mitre.org
Resource:
Broken Link
Third Party Advisory
VDB Entry
Hyperlink: http://www.tp-link.com/en/download/Archer-C5_V1.20.html#Firmware
Source: cve@mitre.org
Resource:
Product
Hyperlink: http://www.tp-link.com/en/download/Archer-C7_V2.html#Firmware
Source: cve@mitre.org
Resource:
Product
Hyperlink: http://www.tp-link.com/en/download/Archer-C8_V1.html#Firmware
Source: cve@mitre.org
Resource:
Product
Hyperlink: http://www.tp-link.com/en/download/Archer-C9_V1.html#Firmware
Source: cve@mitre.org
Resource:
Product
Hyperlink: http://www.tp-link.com/en/download/TL-WDR3500_V1.html#Firmware
Source: cve@mitre.org
Resource:
Product
Hyperlink: http://www.tp-link.com/en/download/TL-WDR3600_V1.html#Firmware
Source: cve@mitre.org
Resource:
Product
Hyperlink: http://www.tp-link.com/en/download/TL-WDR4300_V1.html#Firmware
Source: cve@mitre.org
Resource:
Product
Hyperlink: http://www.tp-link.com/en/download/TL-WR740N_V5.html#Firmware
Source: cve@mitre.org
Resource:
Product
Hyperlink: http://www.tp-link.com/en/download/TL-WR741ND_V5.html#Firmware
Source: cve@mitre.org
Resource:
Product
Hyperlink: http://www.tp-link.com/en/download/TL-WR841ND_V9.html#Firmware
Source: cve@mitre.org
Resource:
Product
Hyperlink: http://www.tp-link.com/en/download/TL-WR841N_V9.html#Firmware
Source: cve@mitre.org
Resource:
Product
Hyperlink: https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20150410-0_TP-Link_Unauthenticated_local_file_disclosure_vulnerability_v10.txt
Source: cve@mitre.org
Resource:
Exploit
Not Applicable
Hyperlink: http://packetstormsecurity.com/files/131378/TP-LINK-Local-File-Disclosure.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Third Party Advisory
VDB Entry
Hyperlink: http://seclists.org/fulldisclosure/2015/Apr/26
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Mailing List
Third Party Advisory
Hyperlink: http://www.securityfocus.com/archive/1/535240/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Third Party Advisory
VDB Entry
Hyperlink: http://www.securityfocus.com/bid/74050
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Third Party Advisory
VDB Entry
Hyperlink: http://www.tp-link.com/en/download/Archer-C5_V1.20.html#Firmware
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Product
Hyperlink: http://www.tp-link.com/en/download/Archer-C7_V2.html#Firmware
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Product
Hyperlink: http://www.tp-link.com/en/download/Archer-C8_V1.html#Firmware
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Product
Hyperlink: http://www.tp-link.com/en/download/Archer-C9_V1.html#Firmware
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Product
Hyperlink: http://www.tp-link.com/en/download/TL-WDR3500_V1.html#Firmware
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Product
Hyperlink: http://www.tp-link.com/en/download/TL-WDR3600_V1.html#Firmware
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Product
Hyperlink: http://www.tp-link.com/en/download/TL-WDR4300_V1.html#Firmware
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Product
Hyperlink: http://www.tp-link.com/en/download/TL-WR740N_V5.html#Firmware
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Product
Hyperlink: http://www.tp-link.com/en/download/TL-WR741ND_V5.html#Firmware
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Product
Hyperlink: http://www.tp-link.com/en/download/TL-WR841ND_V9.html#Firmware
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Product
Hyperlink: http://www.tp-link.com/en/download/TL-WR841N_V9.html#Firmware
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Product
Hyperlink: https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20150410-0_TP-Link_Unauthenticated_local_file_disclosure_vulnerability_v10.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Not Applicable
Hyperlink: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2015-3035
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Resource:
US Government Resource

Change History

0
Information is not available yet

Similar CVEs

1174Records found

CVE-2018-3949
Matching Score-10
Assigner-Talos
ShareView Details
Matching Score-10
Assigner-Talos
CVSS Score-7.5||HIGH
EPSS-23.38% / 95.99%
||
7 Day CHG~0.00%
Published-01 Dec, 2018 | 03:00
Updated-17 Sep, 2024 | 01:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An exploitable information disclosure vulnerability exists in the HTTP server functionality of the TP-Link TL-R600VPN. A specially crafted URL can cause a directory traversal, resulting in the disclosure of sensitive system files. An attacker can send either an unauthenticated or an authenticated web request to trigger this vulnerability.

Action-Not Available
Vendor-Talos (Cisco Systems, Inc.)TP-Link Systems Inc.
Product-tl-r600vpn_firmwaretl-r600vpnTP-Link
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2012-5687
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-67.48% / 98.59%
||
7 Day CHG~0.00%
Published-01 Nov, 2012 | 10:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Directory traversal vulnerability in the web-based management feature on the TP-LINK TL-WR841N router with firmware 3.13.9 build 120201 Rel.54965n and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the PATH_INFO to the help/ URI.

Action-Not Available
Vendor-n/aTP-Link Systems Inc.
Product-tl-wr841ntl-wr841n_firmwaren/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2022-4499
Matching Score-8
Assigner-CERT/CC
ShareView Details
Matching Score-8
Assigner-CERT/CC
CVSS Score-7.5||HIGH
EPSS-0.11% / 28.31%
||
7 Day CHG~0.00%
Published-11 Jan, 2023 | 18:48
Updated-04 Nov, 2025 | 20:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
The strcmp function in TP-Link routers, Archer C5 and WR710N-V1, used for checking credentials in httpd, is susceptible to a side-channel attack.

TP-Link routers, Archer C5 and WR710N-V1, using the latest software, the strcmp function used for checking credentials in httpd, is susceptible to a side-channel attack. By measuring the response time of the httpd process, an attacker could guess each byte of the username and password.

Action-Not Available
Vendor-TP-Link Systems Inc.
Product-tl-wr710narcher_c5tl-wr710n_firmwarearcher_c5_firmwareWR710NArcher C5
CWE ID-CWE-203
Observable Discrepancy
CVE-2025-14738
Matching Score-8
Assigner-TP-Link Systems Inc.
ShareView Details
Matching Score-8
Assigner-TP-Link Systems Inc.
CVSS Score-5.7||MEDIUM
EPSS-0.22% / 44.43%
||
7 Day CHG~0.00%
Published-18 Dec, 2025 | 18:01
Updated-29 Jan, 2026 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Configuration Disclosure Vulnerability in TP-Link WA850RE

Improper authentication vulnerability in TP-Link WA850RE (httpd modules) allows unauthenticated attackers to download the configuration file.This issue affects: ≤ WA850RE V2_160527, ≤ WA850RE V3_160922.

Action-Not Available
Vendor-TP-Link Systems Inc.TP-Link Systems Inc.
Product-tl-wa850retl-wa850re_firmwareWA850RE
CWE ID-CWE-287
Improper Authentication
CVE-2017-8076
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.42% / 61.95%
||
7 Day CHG~0.00%
Published-23 Apr, 2017 | 16:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

On the TP-Link TL-SG108E 1.0, admin network communications are RC4 encoded, even though RC4 is deprecated. This affects the 1.1.2 Build 20141017 Rel.50749 firmware.

Action-Not Available
Vendor-n/aTP-Link Systems Inc.
Product-tl-sg108e_firmwaretl-sg108en/a
CWE ID-CWE-326
Inadequate Encryption Strength
CVE-2024-53623
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.15% / 35.26%
||
7 Day CHG~0.00%
Published-29 Nov, 2024 | 00:00
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect access control in the component l_0_0.xml of TP-Link ARCHER-C7 v5 allows attackers to access sensitive information.

Action-Not Available
Vendor-n/aTP-Link Systems Inc.
Product-n/aarcher_c7_firmware
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-9292
Matching Score-8
Assigner-TP-Link Systems Inc.
ShareView Details
Matching Score-8
Assigner-TP-Link Systems Inc.
CVSS Score-2||LOW
EPSS-0.02% / 4.38%
||
7 Day CHG~0.00%
Published-13 Feb, 2026 | 00:21
Updated-01 Apr, 2026 | 20:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Permissive Web Security Policy Allows Cross-Origin Access Control Bypass on Omada Cloud Controllers

A permissive web security configuration may allow cross-origin restrictions enforced by modern browsers to be bypassed under specific circumstances. Exploitation requires the presence of an existing client-side injection vulnerability and user access to the affected web interface. Successful exploitation could allow unauthorized disclosure of sensitive information. Fixed in updated Omada Cloud Controller service versions deployed automatically by TP‑Link. No user action is required.

Action-Not Available
Vendor-TP-Link Systems Inc.TP-Link Systems Inc.
Product-wi-fi_navikidshieldfestaaginetkasatapotethervigiomadaomada_guardtpcamerawifi_toolkittp-partnerdecoOmada Cloud Controller
CWE ID-CWE-942
Permissive Cross-domain Policy with Untrusted Domains
CVE-2023-27098
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.05% / 14.15%
||
7 Day CHG~0.00%
Published-09 Jan, 2024 | 00:00
Updated-18 Jun, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TP-Link Tapo APK up to v2.12.703 uses hardcoded credentials for access to the login panel.

Action-Not Available
Vendor-n/aTP-Link Systems Inc.
Product-tapotapo_c200n/a
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CVE-2023-23040
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.15% / 35.23%
||
7 Day CHG~0.00%
Published-22 Feb, 2023 | 00:00
Updated-12 Mar, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TP-Link router TL-WR940N V6 3.19.1 Build 180119 uses a deprecated MD5 algorithm to hash the admin password used for basic authentication.

Action-Not Available
Vendor-n/aTP-Link Systems Inc.
Product-tl-wr940ntl-wr940n_firmwaren/a
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CVE-2021-28857
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.33% / 55.93%
||
7 Day CHG~0.00%
Published-15 Jun, 2021 | 21:51
Updated-03 Aug, 2024 | 21:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TP-Link's TL-WPA4220 4.0.2 Build 20180308 Rel.37064 username and password are sent via the cookie.

Action-Not Available
Vendor-n/aTP-Link Systems Inc.
Product-tl-wpa4220_firmwaretl-wpa4220n/a
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2023-38907
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.31% / 53.97%
||
7 Day CHG~0.00%
Published-25 Sep, 2023 | 00:00
Updated-02 Aug, 2024 | 17:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in TPLink Smart Bulb Tapo series L530 before 1.2.4, L510E before 1.1.0, L630 before 1.0.4, P100 before 1.5.0, and Tapo Application 2.8.14 allows a remote attacker to replay old messages encrypted with a still valid session key.

Action-Not Available
Vendor-n/aTP-Link Systems Inc.
Product-tapo_l530e_firmwaretapotapo_l530en/a
CVE-2013-2572
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-49.29% / 97.80%
||
7 Day CHG~0.00%
Published-29 Jan, 2020 | 18:04
Updated-06 Aug, 2024 | 15:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Security Bypass vulnerability exists in TP-LINK IP Cameras TL-SC 3130, TL-SC 3130G, 3171G, 4171G, and 3130 1.6.18P12 due to default hard-coded credentials for the administrative Web interface, which could let a malicious user obtain unauthorized access to CGI files.

Action-Not Available
Vendor-n/aTP-Link Systems Inc.
Product-tl-sc_4171g_firmwaretl-sc_3130gtl-sc_3171gtl-sc_3130g_firmwaretl-sc_3130_firmwaretl-sc_3130tl-sc_3171g_firmwaretl-sc_4171gn/a
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2022-37255
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-9.27% / 92.77%
||
7 Day CHG-2.72%
Published-16 Apr, 2023 | 00:00
Updated-06 Feb, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TP-Link Tapo C310 1.3.0 devices allow access to the RTSP video feed via credentials of User --- and Password TPL075526460603.

Action-Not Available
Vendor-n/aTP-Link Systems Inc.
Product-tapo_c310tapo_c310_firmwaren/a
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2012-6276
Matching Score-6
Assigner-CERT/CC
ShareView Details
Matching Score-6
Assigner-CERT/CC
CVSS Score-4.3||MEDIUM
EPSS-9.44% / 92.84%
||
7 Day CHG~0.00%
Published-26 Jan, 2013 | 21:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Directory traversal vulnerability in the web-based management interface on the TP-LINK TL-WR841N router with firmware 3.13.9 build 120201 Rel.54965n and earlier allows remote attackers to read arbitrary files via the URL parameter.

Action-Not Available
Vendor-n/aTP-Link Systems Inc.
Product-tl-wr841ntl-wr841n_firmwaren/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2017-16959
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.38% / 59.33%
||
7 Day CHG~0.00%
Published-27 Nov, 2017 | 10:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The locale feature in cgi-bin/luci on TP-Link TL-WVR, TL-WAR, TL-ER, and TL-R devices allows remote authenticated users to test for the existence of arbitrary files by making an operation=write;locale=%0d request, and then making an operation=read request with a crafted Accept-Language HTTP header, related to the set_sysinfo and get_sysinfo functions in /usr/lib/lua/luci/controller/locale.lua in uhttpd.

Action-Not Available
Vendor-n/aTP-Link Systems Inc.
Product-tl-r479gpe-actl-wvr1200l_firmwaretl-wvr900l_firmwaretl-war458tl-wvr458p_firmwaretl-war450_firmwaretl-r473gp-actl-wvr4300l_firmwaretl-er5120g_firmwaretl-r478g_firmwaretl-wvr1300g_firmwaretl-er6120g_firmwaretl-war450ltl-er7520g_firmwaretl-r479gp-ac_firmwaretl-wvr450gtl-war458l_firmwaretl-er5110g_firmwaretl-wvr450g_firmwaretl-r473g_firmwaretl-wvr302_firmwaretl-r479p-ac_firmwaretl-r4239g_firmwaretl-war1200ltl-er5120gtl-wvr900ltl-r479gpe-ac_firmwaretl-r483_firmwaretl-r478gtl-wvr1750ltl-war302tl-wvr1300ltl-war1300l_firmwaretl-wvr1300l_firmwaretl-r4149gtl-wvr458tl-er7520gtl-r478tl-er5520g_firmwaretl-er3220gtl-war1750ltl-wvr4300ltl-r478g\+_firmwaretl-r4299g_firmwaretl-war302_firmwaretl-war2600ltl-wvr458ltl-wvr2600ltl-er3210g_firmwaretl-wvr458ptl-wvr458l_firmwaretl-war1300gtl-er5510g_firmwaretl-wvr300_firmwaretl-war1300ltl-er6520g_firmwaretl-wvr450l_firmwaretl-war1750l_firmwaretl-war450l_firmwaretl-r4239gtl-wvr302tl-r483g_firmwaretl-r483gtl-war458_firmwaretl-wvr450tl-wvr1750l_firmwaretl-wvr900g_firmwaretl-war2600l_firmwaretl-war450tl-er6110g_firmwaretl-wvr300tl-r4149g_firmwaretl-er6510g_firmwaretl-r483tl-r479gp-actl-war900ltl-er3220g_firmwaretl-wvr450_firmwaretl-r478_firmwaretl-er6220g_firmwaretl-er3210gtl-r473tl-er6510gtl-war1200l_firmwaretl-er6520gtl-wvr900gtl-war900l_firmwaretl-er6220gtl-r473p-actl-er6120gtl-wvr458_firmwaretl-r473p-ac_firmwaretl-r473_firmwaretl-wvr450ltl-r478\+tl-r478g\+tl-er5510gtl-r488tl-war458ltl-r478\+_firmwaretl-er5110gtl-er5520gtl-r488_firmwaretl-er6110gtl-r479p-actl-wvr1200ltl-r4299gtl-r473gn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2026-0655
Matching Score-6
Assigner-TP-Link Systems Inc.
ShareView Details
Matching Score-6
Assigner-TP-Link Systems Inc.
CVSS Score-6.9||MEDIUM
EPSS-0.05% / 16.17%
||
7 Day CHG~0.00%
Published-02 Mar, 2026 | 17:39
Updated-06 Mar, 2026 | 19:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Path Traversal on TP-Link Deco BE25

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in TP-Link Deco BE25 v1.0 (web modules) allows authenticated adjacent attacker to read arbitrary files or cause denial of service.  This issue affects Deco BE25 v1.0: through 1.1.1 Build 20250822.

Action-Not Available
Vendor-TP-Link Systems Inc.TP-Link Systems Inc.
Product-deco_be25deco_be25_firmwareDeco BE25 v1.0
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2026-0651
Matching Score-6
Assigner-TP-Link Systems Inc.
ShareView Details
Matching Score-6
Assigner-TP-Link Systems Inc.
CVSS Score-6.9||MEDIUM
EPSS-0.08% / 23.83%
||
7 Day CHG~0.00%
Published-10 Feb, 2026 | 17:27
Updated-07 Apr, 2026 | 14:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Path Traversal on TP-Link Tapo D235 and C260 via Local https

A path traversal vulnerability was identified TP-Link Tapo C260 v1, D235 v1 and C520WS v2.6 within the HTTP server’s handling of GET requests. The server performs path normalization before fully decoding URL encoded input and falls back to using the raw path when normalization fails. An attacker can exploit this logic flaw by supplying crafted, URL encoded traversal sequences that bypass directory restrictions and allow access to files outside the intended web root. Successful exploitation may allow authenticated attackers to get disclosure of sensitive system files and credentials, while unauthenticated attackers may gain access to non-sensitive static assets.

Action-Not Available
Vendor-TP Link Systems Inc.TP-Link Systems Inc.TP-Link Systems Inc.
Product-tapo_c260_firmwaretapo_c260Tapo D235 v1Tapo C260 v1Tapo C520WS v2.6
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2020-12475
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 14.66%
||
7 Day CHG~0.00%
Published-04 May, 2020 | 13:36
Updated-04 Aug, 2024 | 11:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TP-Link Omada Controller Software 3.2.6 allows Directory Traversal for reading arbitrary files via com.tp_link.eap.web.portal.PortalController.getAdvertiseFile in /opt/tplink/EAPController/lib/eap-web-3.2.6.jar.

Action-Not Available
Vendor-n/aTP-Link Systems Inc.
Product-omada_controllern/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2013-4654
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.91% / 75.94%
||
7 Day CHG~0.00%
Published-13 Nov, 2019 | 15:56
Updated-06 Aug, 2024 | 16:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Symlink Traversal vulnerability in TP-LINK TL-WDR4300 and TL-1043ND..

Action-Not Available
Vendor-n/aTP-Link Systems Inc.
Product-tl-1043ndtl-wdr4300tl-wdr4300_firmwaretl-1043nd_firmwaren/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2022-45921
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.58% / 69.03%
||
7 Day CHG~0.00%
Published-28 Nov, 2022 | 00:00
Updated-28 Apr, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

FusionAuth before 1.41.3 allows a file outside of the application root to be viewed or retrieved using an HTTP request. To be specific, an attacker may be able to view or retrieve any file readable by the user running the FusionAuth process.

Action-Not Available
Vendor-fusionauthn/a
Product-fusionauthn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2005-2349
Matching Score-4
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-4
Assigner-Debian GNU/Linux
CVSS Score-7.5||HIGH
EPSS-0.36% / 57.73%
||
7 Day CHG~0.00%
Published-28 Oct, 2019 | 13:24
Updated-07 Aug, 2024 | 22:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Zoo 2.10 has Directory traversal

Action-Not Available
Vendor-zoo_projectn/a
Product-zoon/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2018-7669
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-24.46% / 96.14%
||
7 Day CHG~0.00%
Published-27 Apr, 2018 | 16:00
Updated-05 Aug, 2024 | 06:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Sitecore Sitecore.NET 8.1 rev. 151207 Hotfix 141178-1 and above. The 'Log Viewer' application is vulnerable to a directory traversal attack, allowing an attacker to access arbitrary files from the host Operating System using a sitecore/shell/default.aspx?xmlcontrol=LogViewerDetails&file= URI. Validation is performed to ensure that the text passed to the 'file' parameter correlates to the correct log file directory. This filter can be bypassed by including a valid log filename and then appending a traditional 'dot dot' style attack.

Action-Not Available
Vendor-n/aSitecore
Product-sitecore.netn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2022-46154
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-8.6||HIGH
EPSS-2.64% / 85.79%
||
7 Day CHG~0.00%
Published-06 Dec, 2022 | 18:08
Updated-23 Apr, 2025 | 16:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Arbitrary file access in KodExplorer

Kodexplorer is a chinese language web based file manager and browser based code editor. Versions prior to 4.50 did not prevent unauthenticated users from requesting arbitrary files from the host OS file system. As a result any files available to the host process may be accessed by arbitrary users. This issue has been addressed in version 4.50. Users are advised to upgrade. There are no known workarounds for this issue.

Action-Not Available
Vendor-kodcloudkalcaddle
Product-kodexplorerKodExplorer
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2022-46639
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.70% / 72.07%
||
7 Day CHG~0.00%
Published-23 Jan, 2023 | 00:00
Updated-03 Apr, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the descarga_etiqueta.php component of Correos Prestashop 1.7.x allows attackers to execute a directory traversal.

Action-Not Available
Vendor-correosn/a
Product-correosn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2022-46902
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.3||MEDIUM
EPSS-0.11% / 28.46%
||
7 Day CHG~0.00%
Published-25 Jul, 2023 | 00:00
Updated-30 Oct, 2024 | 14:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Vocera Report Server and Voice Server 5.x through 5.8. There is a Path Traversal for an Unzip operation. The Vocera Report Console contains a websocket function that allows for the restoration of the database from a ZIP archive that expects a SQL import file. During the unzip operation, the code takes file paths from the ZIP archive and writes them to a Vocera temporary directory. Unfortunately, the code does not properly check if the file paths include directory traversal payloads that would escape the intended destination.

Action-Not Available
Vendor-voceran/a
Product-report_servervoice_servern/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2022-43864
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-7.5||HIGH
EPSS-0.92% / 76.04%
||
7 Day CHG~0.00%
Published-25 Jan, 2023 | 18:07
Updated-31 Mar, 2025 | 14:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Business Automation Workflow information disclosure

IBM Business Automation Workflow 22.0.2 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 239427.

Action-Not Available
Vendor-IBM Corporation
Product-business_automation_workflowbusiness_monitorBusiness Monitor
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2022-4511
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.38% / 59.38%
||
7 Day CHG~0.00%
Published-15 Dec, 2022 | 00:00
Updated-14 Apr, 2025 | 15:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
RainyGao DocSys path traversal

A vulnerability has been found in RainyGao DocSys and classified as critical. Affected by this vulnerability is an unknown functionality of the component com.DocSystem.controller.UserController#getUserImg. The manipulation leads to path traversal: '../filedir'. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-215851.

Action-Not Available
Vendor-docsys_projectRainyGao
Product-docsysDocSys
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2022-45388
Matching Score-4
Assigner-Jenkins Project
ShareView Details
Matching Score-4
Assigner-Jenkins Project
CVSS Score-7.5||HIGH
EPSS-0.24% / 46.87%
||
7 Day CHG~0.00%
Published-15 Nov, 2022 | 00:00
Updated-30 Apr, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Jenkins Config Rotator Plugin 2.0.1 and earlier does not restrict a file name query parameter in an HTTP endpoint, allowing unauthenticated attackers to read arbitrary files with '.xml' extension on the Jenkins controller file system.

Action-Not Available
Vendor-Jenkins
Product-config_rotatorJenkins Config Rotator Plugin
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2022-42977
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.84% / 74.84%
||
7 Day CHG~0.00%
Published-15 Nov, 2022 | 00:00
Updated-30 Apr, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Netic User Export add-on before 1.3.5 for Atlassian Confluence has the functionality to generate a list of users in the application, and export it. During export, the HTTP request has a fileName parameter that accepts any file on the system (e.g., an SSH private key) to be downloaded.

Action-Not Available
Vendor-n/aAtlassian
Product-confluence_data_centern/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2022-42188
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.42% / 61.88%
||
7 Day CHG~0.00%
Published-18 Oct, 2022 | 00:00
Updated-13 May, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Lavalite 9.0.0, the XSRF-TOKEN cookie is vulnerable to path traversal attacks, enabling read access to arbitrary files on the server.

Action-Not Available
Vendor-lavaliten/a
Product-lavaliten/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2013-1627
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.8||HIGH
EPSS-8.98% / 92.64%
||
7 Day CHG~0.00%
Published-11 Mar, 2013 | 17:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Absolute path traversal vulnerability in NTWebServer.exe in Indusoft Studio 7.0 and earlier and Advantech Studio 7.0 and earlier allows remote attackers to read arbitrary files via a full pathname in an argument to the sub_401A90 CreateFileW function.

Action-Not Available
Vendor-indusoftn/aAdvantech (Advantech Co., Ltd.)
Product-advantech_studioweb_studion/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2022-41720
Matching Score-4
Assigner-Go Project
ShareView Details
Matching Score-4
Assigner-Go Project
CVSS Score-7.5||HIGH
EPSS-0.03% / 10.10%
||
7 Day CHG~0.00%
Published-07 Dec, 2022 | 16:11
Updated-23 Apr, 2025 | 15:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Restricted file access on Windows in os and net/http

On Windows, restricted files can be accessed via os.DirFS and http.Dir. The os.DirFS function and http.Dir type provide access to a tree of files rooted at a given directory. These functions permit access to Windows device files under that root. For example, os.DirFS("C:/tmp").Open("COM1") opens the COM1 device. Both os.DirFS and http.Dir only provide read-only filesystem access. In addition, on Windows, an os.DirFS for the directory (the root of the current drive) can permit a maliciously crafted path to escape from the drive and access any path on the system. With fix applied, the behavior of os.DirFS("") has changed. Previously, an empty root was treated equivalently to "/", so os.DirFS("").Open("tmp") would open the path "/tmp". This now returns an error.

Action-Not Available
Vendor-Go standard libraryGoMicrosoft Corporation
Product-gowindowsosnet/http
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2024-53490
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.84% / 74.83%
||
7 Day CHG~0.00%
Published-05 Dec, 2024 | 00:00
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Favorites-web 1.3.0 favorites-web has a directory traversal vulnerability in SecurityFilter.java.

Action-Not Available
Vendor-n/a
Product-n/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2022-41591
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-7.5||HIGH
EPSS-0.21% / 42.86%
||
7 Day CHG~0.00%
Published-20 Dec, 2022 | 00:00
Updated-16 Apr, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The backup module has a path traversal vulnerability. Successful exploitation of this vulnerability causes unauthorized access to other system files.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-harmonyosemuiHarmonyOSEMUI
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2022-40608
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.70% / 72.02%
||
7 Day CHG~0.00%
Published-19 Sep, 2022 | 17:25
Updated-17 Sep, 2024 | 01:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Spectrum Protect Plus 10.1.6 through 10.1.11 Microsoft File Systems restore operation can download any file on the target machine by manipulating the URL with a directory traversal attack. This results in the restore operation gaining access to files which the operator should not have access to. IBM X-Force ID: 235873.

Action-Not Available
Vendor-IBM Corporation
Product-spectrum_protect_plusSpectrum Protect Plus
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2022-40082
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.39% / 60.16%
||
7 Day CHG~0.00%
Published-28 Sep, 2022 | 13:34
Updated-21 May, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Hertz v0.3.0 ws discovered to contain a path traversal vulnerability via the normalizePath function.

Action-Not Available
Vendor-cloudwegon/aMicrosoft Corporation
Product-hertzwindowsn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2026-4659
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-7.5||HIGH
EPSS-0.04% / 11.47%
||
7 Day CHG~0.00%
Published-17 Apr, 2026 | 06:44
Updated-22 Apr, 2026 | 20:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unlimited Elements For Elementor <= 2.0.6 - Authenticated (Contributor+) Arbitrary File Read via Path Traversal in Repeater JSON/CSV URL with Path Traversal

The Unlimited Elements for Elementor plugin for WordPress is vulnerable to Arbitrary File Read via the Repeater JSON/CSV URL parameter in versions up to, and including, 2.0.6. This is due to insufficient path traversal sanitization in the URLtoRelative() and urlToPath() functions, combined with the ability to enable debug output in widget settings. The URLtoRelative() function only performs a simple string replacement to remove the site's base URL without sanitizing path traversal sequences (../), and the cleanPath() function only normalizes directory separators without removing traversal components. This allows an attacker to provide a URL like http://site.com/../../../../etc/passwd which, after URLtoRelative() strips the domain, results in /../../../../etc/passwd being concatenated with the base path and ultimately resolved to /etc/passwd. This makes it possible for authenticated attackers with Author-level access and above to read arbitrary local files from the WordPress host, including sensitive files such as wp-config.

Action-Not Available
Vendor-unitecms
Product-Unlimited Elements For Elementor
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2005-1813
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.42% / 61.78%
||
7 Day CHG~0.00%
Published-01 Jun, 2005 | 04:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Directory traversal vulnerability in FutureSoft TFTP Server Evaluation Version 1.0.0.1 allows remote attackers to read arbitrary files via a TFTP GET request containing (1) "../" (dot dot slash) or (2) "..\" (dot dot backslash) sequences.

Action-Not Available
Vendor-futuresoftn/a
Product-tftp_server_2000n/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2022-39001
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-7.5||HIGH
EPSS-0.19% / 40.72%
||
7 Day CHG~0.00%
Published-16 Sep, 2022 | 17:57
Updated-03 Jun, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The number identification module has a path traversal vulnerability. Successful exploitation of this vulnerability may cause data disclosure.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-emuiharmonyosmagic_uiHarmonyOSEMUIMagic UI
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2022-38794
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-49.01% / 97.79%
||
7 Day CHG~0.00%
Published-27 Aug, 2022 | 20:26
Updated-03 Aug, 2024 | 11:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Zaver through 2020-12-15 allows directory traversal via the GET /.. substring.

Action-Not Available
Vendor-zaver_projectn/a
Product-zavern/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2026-5710
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-7.5||HIGH
EPSS-0.14% / 33.71%
||
7 Day CHG~0.00%
Published-17 Apr, 2026 | 17:25
Updated-22 Apr, 2026 | 20:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Drag and Drop Multiple File Upload for Contact Form 7 <= 1.3.9.6 - Unauthenticated Limited Arbitrary File Read via mfile Field

The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to Path Traversal leading to Arbitrary File Read in versions up to and including 1.3.9.6. This is due to the plugin using client-supplied mfile[] POST values as the source of truth for email attachment selection without performing any server-side upload provenance check, path canonicalization, or directory containment boundary enforcement. In dnd_wpcf7_posted_data(), each user-submitted filename is directly appended to the plugin's upload URL without sanitization. In dnd_cf7_mail_components(), the URL is converted back to a filesystem path using str_replace() and only file_exists() is used as the acceptance check before attaching the file to the outgoing CF7 email. This makes it possible for unauthenticated attackers to read and exfiltrate arbitrary files readable by the web server process via path traversal sequences in the mfile[] parameter, with files being disclosed as email attachments. Note: This vulnerability is limited to the 'wp-content' folder due to the wpcf7_is_file_path_in_content_dir() function in the Contact Form 7 plugin.

Action-Not Available
Vendor-glenwpcoder
Product-Drag and Drop Multiple File Upload for Contact Form 7
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2022-39040
Matching Score-4
Assigner-TWCERT/CC
ShareView Details
Matching Score-4
Assigner-TWCERT/CC
CVSS Score-7.5||HIGH
EPSS-3.07% / 86.82%
||
7 Day CHG~0.00%
Published-03 Jan, 2023 | 00:00
Updated-10 Apr, 2025 | 15:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
aEnrich a+HRD - Path Traversal

aEnrich a+HRD log read function has a path traversal vulnerability. An unauthenticated remote attacker can exploit this vulnerability to bypass authentication and download arbitrary system files.

Action-Not Available
Vendor-Yukai Digital Technology (aEnrich)
Product-a\+hrda+HRD
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2022-39812
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.21% / 79.07%
||
7 Day CHG~0.00%
Published-27 Jan, 2023 | 00:00
Updated-28 Mar, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Italtel NetMatch-S CI 5.2.0-20211008 allows Absolute Path Traversal under NMSCI-WebGui/SaveFileUploader. An unauthenticated user can upload files to an arbitrary path. An attacker can change the uploadDir parameter in a POST request (not possible using the GUI) to an arbitrary directory. Because the application does not check in which directory a file will be uploaded, an attacker can perform a variety of attacks that can result in unauthorized access to the server.

Action-Not Available
Vendor-italteln/a
Product-netmatch-s_cin/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2022-39037
Matching Score-4
Assigner-TWCERT/CC
ShareView Details
Matching Score-4
Assigner-TWCERT/CC
CVSS Score-7.5||HIGH
EPSS-1.04% / 77.58%
||
7 Day CHG~0.00%
Published-10 Nov, 2022 | 02:20
Updated-01 May, 2025 | 14:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FLOWRING Agentflow BPM - Path Traversal

Agentflow BPM file download function has a path traversal vulnerability. An unauthenticated remote attacker can exploit this vulnerability to bypass authentication and download arbitrary system files.

Action-Not Available
Vendor-flowringFLOWRING
Product-agentflowAgentflow BPM
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2026-41205
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.7||HIGH
EPSS-0.09% / 25.31%
||
7 Day CHG~0.00%
Published-23 Apr, 2026 | 18:52
Updated-28 Apr, 2026 | 19:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Mako: Path traversal via double-slash URI prefix in TemplateLookup

Mako is a template library written in Python. Prior to 1.3.11, TemplateLookup.get_template() is vulnerable to path traversal when a URI starts with // (e.g., //../../../secret.txt). The root cause is an inconsistency between two slash-stripping implementations. Any file readable by the process can be returned as rendered template content when an application passes untrusted input directly to TemplateLookup.get_template(). This vulnerability is fixed in 1.3.11.

Action-Not Available
Vendor-sqlalchemysqlalchemy
Product-makomako
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2022-37060
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-39.51% / 97.32%
||
7 Day CHG~0.00%
Published-18 Aug, 2022 | 00:00
Updated-17 Oct, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

FLIR AX8 thermal sensor cameras version up to and including 1.46.16 is vulnerable to Directory Traversal due to an improper access restriction. An unauthenticated, remote attacker can exploit this by sending a URI that contains directory traversal characters to disclose the contents of files located outside of the server's restricted path. NOTE: The vendor has stated that with the introduction of firmware version 1.49.16 (Jan 2023) the FLIR AX8 should no longer be affected by the vulnerability reported. Latest firmware version (as of Oct 2025, was released Jun 2024) is 1.55.16.

Action-Not Available
Vendor-flirn/a
Product-flir_ax8_firmwareflir_ax8n/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2026-39408
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.01% / 2.87%
||
7 Day CHG~0.00%
Published-08 Apr, 2026 | 14:42
Updated-21 Apr, 2026 | 18:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Hono has a path traversal in toSSG() allows writing files outside the output directory

Hono is a Web application framework that provides support for any JavaScript runtime. Prior to 4.12.12, a path traversal issue in toSSG() allows files to be written outside the configured output directory during static site generation. When using dynamic route parameters via ssgParams, specially crafted values can cause generated file paths to escape the intended output directory. This vulnerability is fixed in 4.12.12.

Action-Not Available
Vendor-honohonojs
Product-honohono
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2022-37700
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.82% / 82.97%
||
7 Day CHG~0.00%
Published-19 Sep, 2022 | 15:58
Updated-03 Aug, 2024 | 10:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Zentao Demo15 is vulnerable to Directory Traversal. The impact is: obtain sensitive information (remote). The component is: URL : view-source:https://demo15.zentao.pm/user-login.html/zentao/index.php?mode=getconfig.

Action-Not Available
Vendor-easycorpn/a
Product-zentaon/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2022-38202
Matching Score-4
Assigner-Environmental Systems Research Institute, Inc.
ShareView Details
Matching Score-4
Assigner-Environmental Systems Research Institute, Inc.
CVSS Score-7.5||HIGH
EPSS-0.69% / 71.90%
||
7 Day CHG~0.00%
Published-28 Dec, 2022 | 00:00
Updated-10 Apr, 2025 | 14:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
BUG-000152121 - Directory traversal vulnerability in ArcGIS Server.

There is a path traversal vulnerability in Esri ArcGIS Server versions 10.9.1 and below. Successful exploitation may allow a remote, unauthenticated attacker traverse the file system to access files outside of the intended directory on ArcGIS Server. This could lead to the disclosure of sensitive site configuration information (not user datasets).

Action-Not Available
Vendor-Environmental Systems Research Institute, Inc. ("Esri")
Product-arcgis_serverArcGIS Server
CWE ID-CWE-23
Relative Path Traversal
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2022-37681
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.56% / 68.40%
||
7 Day CHG~0.00%
Published-29 Aug, 2022 | 13:46
Updated-13 Feb, 2025 | 16:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Hitachi Kokusai Electric Newtork products for monitoring system (Camera, Decoder and Encoder) and below allows attckers to perform a directory traversal via a crafted GET request to the endpoint /ptippage.cgi. Security information ID hitachi-sec-2022-001 contains fixes for the issue.

Action-Not Available
Vendor-n/aHitachi, Ltd.
Product-hc-ip9100hd_firmwarehc-ip9100hdn/a
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
  • Previous
  • 1
  • 2
  • 3
  • ...
  • 23
  • 24
  • Next
Details not found