CVE-2026-28769

A path traversal vulnerability exists in the /IDC_Logging/checkifdone.cgi script in International Datacasting Corporation (IDC) SFX Series SuperFlex Satellite Receiver Web management portal version 101. An authenticated attacker can manipulate the `file` parameter to traverse directories and enumerate arbitrary files on the underlying filesystem. Due to the insecure perl file path handling function in use, a authenticated actor is able to preform directory traversal, with the backup endpoint confirming a file exists by indicating that a backup operation was successful or when using the path of a non existent file, the returned status is failed.
References
Link Resource
https://www.abdulmhsblog.com/posts/sfx2100-vulns/ Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:datacast:sfx2100_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:datacast:sfx2100:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-04 07:16

Updated : 2026-03-09 18:20


NVD link : CVE-2026-28769

Mitre link : CVE-2026-28769

CVE.ORG link : CVE-2026-28769


JSON object : View

Products Affected

datacast

  • sfx2100_firmware
  • sfx2100
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')