CVE-2007-3266

ifnet webif.cgi - Directory Traversal via outconfig Parameter

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2007-3266. PoCs published by maiosyet.

AI-analyzed exploit summary This exploit demonstrates a local file inclusion vulnerability in WebIf due to improper input sanitization. It allows an attacker to read arbitrary files by manipulating the 'outconfig' parameter.

Description

Directory traversal vulnerability in webif.cgi in ifnet WEBIF allows remote attackers to include and execute arbitrary local files a .. (dot dot) in the outconfig parameter.

Exploits (1)

exploitdb WORKING POC VERIFIED
by maiosyet · textwebappscgi
https://www.exploit-db.com/exploits/30199

This exploit demonstrates a local file inclusion vulnerability in WebIf due to improper input sanitization. It allows an attacker to read arbitrary files by manipulating the 'outconfig' parameter.

Classification
Working Poc 90%
Attack Type
Info Leak
Complexity
Trivial
Reliability
Reliable
Target: WebIf (version not specified)
No auth needed
Prerequisites: Network access to the vulnerable WebIf instance
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (7)

Core 7
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/37508
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/2816
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/24516
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/34921
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/25693
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/471647/100/0/threaded

Scores

EPSS 0.1153
EPSS Percentile 93.7%

Details

Status published
Products (1)
ifnet/webif.cgi
Published Jun 19, 2007
Tracked Since Feb 18, 2026