Description
Directory traversal vulnerability in ComGetLogFile.php3 for TrackerCam 5.12 and earlier allows remote attackers to read arbitrary files via ".." sequences and (1) "/" slash), (2) "\" (backslash), or (3) hex-encoded characters in the fn parameter.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Luigi Auriemma · textwebappsphp
https://www.exploit-db.com/exploits/25123
References (3)
Core 3
Core References
Exploit, Vendor Advisory mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/390918
Exploit, Vendor Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/12592
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/19414
Scores
EPSS
0.0345
EPSS Percentile
87.6%
Details
Status
published
Products (1)
trackercam/trackercam
< 5.12
Published
Mar 30, 2005
Tracked Since
Feb 18, 2026