CVE-2007-4226

BlueCat Networks Proteus IPAM <2.0.2.0 - Path Traversal

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2007-4226. PoCs published by defaultroute.

AI-analyzed exploit summary This exploit describes a privilege escalation vulnerability in BlueCat Networks Adonis devices, allowing an attacker with administrative privileges to write arbitrary data with superuser privileges by manipulating TFTP file uploads. The attack involves creating a TFTP group, adding a file named '../etc/shadow', and deploying it to overwrite the shadow file.

Description

Directory traversal vulnerability in the BlueCat Networks Proteus IPAM appliance 2.0.2.0 (Adonis DNS/DHCP appliance 5.0.2.8) allows remote authenticated administrators, with certain TFTP privileges, to create and overwrite arbitrary files via a .. (dot dot) in a pathname. NOTE: this can be leveraged for administrative access by overwriting /etc/shadow.

Exploits (1)

exploitdb WRITEUP VERIFIED
by defaultroute · textremotelinux
https://www.exploit-db.com/exploits/30454

This exploit describes a privilege escalation vulnerability in BlueCat Networks Adonis devices, allowing an attacker with administrative privileges to write arbitrary data with superuser privileges by manipulating TFTP file uploads. The attack involves creating a TFTP group, adding a file named '../etc/shadow', and deploying it to overwrite the shadow file.

Classification
Writeup 100%
Attack Type
Lpe
Complexity
Moderate
Reliability
Reliable
Target: BlueCat Networks Adonis 5.0.2.8
Auth required
Prerequisites: Administrative access to Proteus configuration · Ability to deploy configurations to Adonis appliance
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (9)

Core 9
Core References
Exploit vdb-entry x_refsource_sectrack
http://securitytracker.com/id?1018521
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/35807
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/25214
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2007/2840
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/2986
Mailing List mailing-list x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=118669433531027&w=2
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/475667/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/39397
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/26354

Scores

EPSS 0.0699
EPSS Percentile 91.6%

Details

Status published
Products (1)
bluecat_networks/adonis 5.0.2.8
Published Aug 08, 2007
Tracked Since Feb 18, 2026