Directory Traversal vulnerability in D-Link DAP-1650 Firmware v.1.03 allows a local attacker to escalate privileges via the hedwig.cgi component.
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '.../...//' (doubled triple dot slash) sequences that can resolve to a location that is outside of that directory.
Link | Tags |
---|---|
https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10266 | vendor advisory |
https://coldwx.github.io/CVE-2024-40505.html | third party advisory |