CVE-2007-0357

fritzdsl 02.02.29 - Directory Traversal via URL-Encoded Dot Dot Backslash Sequences

Title source: llm
STIX 2.1

Description

Directory traversal vulnerability in the AVM IGD CTRL Service in Fritz!DSL 02.02.29 allows remote attackers to read arbitrary files via ..%5C (URL-encoded dot dot backslash) sequences in a URI requested from the AR7 webserver.

Exploits (1)

exploitdb WORKING POC VERIFIED
by DPR · textremotewindows
https://www.exploit-db.com/exploits/29490

References (7)

Core 7
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/32866
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/31556
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2007/0236
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/23774
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/2159
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/22093

Scores

EPSS 0.0861
EPSS Percentile 92.5%

Details

Status published
Products (1)
fritzdsl/fritzdsl 02.02.29
Published Jan 19, 2007
Tracked Since Feb 18, 2026