A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges to bypass the path traversal checks and delete an arbitrary file potentially resulting in a reboot to factory default settings.
Metrics
Affected Vendors & Products
References
History
Wed, 07 May 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 07 May 2025 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Wed, 07 May 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges to bypass the path traversal checks and delete an arbitrary file potentially resulting in a reboot to factory default settings. | |
Weaknesses | CWE-552 | |
References |
|

Status: PUBLISHED
Assigner: sonicwall
Published: 2025-05-07T17:18:23.274Z
Updated: 2025-05-08T03:56:13.583Z
Reserved: 2025-04-11T08:50:31.683Z
Link: CVE-2025-32819

Updated: 2025-05-07T17:30:23.906Z

Status : Awaiting Analysis
Published: 2025-05-07T18:15:42.560
Modified: 2025-05-08T14:39:09.683
Link: CVE-2025-32819

No data.