A directory traversal vulnerability exists in Linksys router's web interface (tested on the E1500 model firmware versions 1.0.00, 1.0.04, and 1.0.05), specifically in the /apply.cgi endpoint. Authenticated attackers can exploit the next_page POST parameter to access arbitrary files outside the intended web root by injecting traversal sequences. This allows exposure of sensitive system files and configuration data.
History

Wed, 06 Aug 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 04 Aug 2025 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Linksys
Linksys e1500
Vendors & Products Linksys
Linksys e1500

Fri, 01 Aug 2025 21:00:00 +0000

Type Values Removed Values Added
Description A directory traversal vulnerability exists in Linksys router's web interface (tested on the E1500 model firmware versions 1.0.00, 1.0.04, and 1.0.05), specifically in the /apply.cgi endpoint. Authenticated attackers can exploit the next_page POST parameter to access arbitrary files outside the intended web root by injecting traversal sequences. This allows exposure of sensitive system files and configuration data.
Title Linksys Routers apply.cgi Path Traversal
Weaknesses CWE-22
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-08-01T20:44:28.559Z

Updated: 2025-08-06T14:00:21.509Z

Reserved: 2025-08-01T18:44:47.918Z

Link: CVE-2013-10062

cve-icon Vulnrichment

Updated: 2025-08-06T14:00:12.007Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-01T21:15:28.510

Modified: 2025-08-06T14:15:36.067

Link: CVE-2013-10062

cve-icon Redhat

No data.