A path traversal vulnerability exists in the /IDC_Logging/checkifdone.cgi script in International Datacasting Corporation (IDC) SFX Series SuperFlex Satellite Receiver Web management portal version 101. An authenticated attacker can manipulate the `file` parameter to traverse directories and enumerate arbitrary files on the underlying filesystem. Due to the insecure perl file path handling function in use, a authenticated actor is able to preform directory traversal, with the backup endpoint confirming a file exists by indicating that a backup operation was successful or when using the path of a non existent file, the returned status is failed.
References
| Link | Resource |
|---|---|
| https://www.abdulmhsblog.com/posts/sfx2100-vulns/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-03-04 07:16
Updated : 2026-03-09 18:20
NVD link : CVE-2026-28769
Mitre link : CVE-2026-28769
CVE.ORG link : CVE-2026-28769
JSON object : View
Products Affected
datacast
- sfx2100_firmware
- sfx2100
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
