CVE-2007-0357
fritzdsl 02.02.29 - Directory Traversal via URL-Encoded Dot Dot Backslash Sequences
Title source: llmDescription
Directory traversal vulnerability in the AVM IGD CTRL Service in Fritz!DSL 02.02.29 allows remote attackers to read arbitrary files via ..%5C (URL-encoded dot dot backslash) sequences in a URI requested from the AR7 webserver.
Exploits (1)
References (7)
Core 7
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/32866
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/31556
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2007/0236
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/23774
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/2159
Mailing List mailing-list
x_refsource_fulldisc
http://lists.grok.org.uk/pipermail/full-disclosure/2007-January/051844.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/22093
Scores
EPSS
0.0861
EPSS Percentile
92.5%
Details
Status
published
Products (1)
fritzdsl/fritzdsl
02.02.29
Published
Jan 19, 2007
Tracked Since
Feb 18, 2026