First published: Thu Jul 06 2023(Updated: )
A directory traversal vulnerability exists in the server.js start functionality of Milesight VPN v2.0.2. A specially-crafted network request can lead to arbitrary file read. An attacker can send a network request to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Milesight Milesightvpn | =2.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-23907 is a directory traversal vulnerability in the server.js start functionality of Milesight VPN v2.0.2 that allows arbitrary file read through a specially-crafted network request.
CVE-2023-23907 has a severity value of 7.5 (high).
CVE-2023-23907 affects Milesight VPN v2.0.2 by allowing arbitrary file read through a specially-crafted network request.
As of now, there is no available fix for CVE-2023-23907. It is recommended to apply the latest security patches and updates provided by the vendor.
You can find more information about CVE-2023-23907 at the following reference: [CVE-2023-23907](https://talosintelligence.com/vulnerability_reports/TALOS-2023-1702)