First published: Tue Apr 29 2025(Updated: )
A vulnerability, which was classified as problematic, has been found in Wangshen SecGate 3600 2400. This issue affects some unknown processing of the file ?g=log_export_file. The manipulation of the argument file_name leads to path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wangshen SecGate 3600 | ||
Wangshen SecGate 2400 | ||
Wangshen SecGate | ||
Wangshen SecGate 3600 2400 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-4078 is classified as problematic due to its potential for allowing unauthorized access through path traversal.
To fix CVE-2025-4078, ensure that input validation and sanitization are properly implemented to prevent path traversal attacks on the affected file.
CVE-2025-4078 affects Wangshen SecGate 3600, Wangshen SecGate 2400, and potentially other Wangshen SecGate products.
Yes, CVE-2025-4078 can be exploited remotely due to its nature of being a path traversal vulnerability.
CVE-2025-4078 impacts the processing of the file parameter 'file_name' within the ?g=log_export_file functionality.