8.8

CVE-2025-32819

Medienbericht
Exploit

A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges to bypass the path traversal checks and delete an arbitrary file potentially resulting in a reboot to factory default settings.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
SonicwallSma 100 Firmware Version < 10.2.1.15-81sv
   SonicwallSma 100 Version-
SonicwallSma 200 Firmware Version < 10.2.1.15-81sv
   SonicwallSma 200 Version-
SonicwallSma 210 Firmware Version < 10.2.1.15-81sv
   SonicwallSma 210 Version-
SonicwallSma 400 Firmware Version < 10.2.1.15-81sv
   SonicwallSma 400 Version-
SonicwallSma 410 Firmware Version < 10.2.1.15-81sv
   SonicwallSma 410 Version-
SonicwallSma 500v Firmware Version < 10.2.1.15-81sv
   SonicwallSma 500v Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.34% 0.56
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
134c704f-9b21-4f2e-91b3-4a467353bcc0 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-552 Files or Directories Accessible to External Parties

The product makes files or directories accessible to unauthorized actors, even though they should not be.