SnapGear Management Console SG560 3.1.5 contains a file manipulation vulnerability that allows authenticated users to read, write, and delete files using the edit_config_files CGI script. Attackers can manipulate POST request parameters in /cgi-bin/cgix/edit_config_files to access and modify files outside the intended /etc/config/ directory.
References
| Link | Resource |
|---|---|
| https://exchange.xforce.ibmcloud.com/vulnerabilities/182960 | Third Party Advisory |
| https://packetstorm.news/files/id/157939 | Exploit Third Party Advisory |
| https://www.exploit-db.com/exploits/48556 | Exploit Third Party Advisory VDB Entry |
| https://www.vulncheck.com/advisories/secure-computing-snapgear-management-console-sg-arbitrary-file-readwrite | Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5568.php | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-01-06 16:15
Updated : 2026-02-23 18:59
NVD link : CVE-2020-36909
Mitre link : CVE-2020-36909
CVE.ORG link : CVE-2020-36909
JSON object : View
Products Affected
securecomputing
- snapgear_sg560
- snapgear_sg560_firmware
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
