First published: Wed Jul 17 2024(Updated: )
Path traversal vulnerability exists in FUJITSU Network Edgiot GW1500 (M2M-GW for FENICS). If a remote authenticated attacker with User Class privilege sends a specially crafted request to the affected product, access restricted files containing sensitive information may be accessed. As a result, Administrator Class privileges of the product may be hijacked.
Credit: vultures@jpcert.or.jp
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Fujitsu Network Edgiot Gw1500 Firmware | <v02l19c01 | |
FUJITSU Network Edgiot GW1500 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.