Description
Directory traversal vulnerability in webcamXP 5.3.2.375 and 5.3.2.410 build 2132 allows remote attackers to read arbitrary files via a ..%2F (encoded dot dot slash) in the URI.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by nicx0 · textremotewindows
https://www.exploit-db.com/exploits/7521
References (6)
Core 6
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id?1021484
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/4877
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/32928
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/33257
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/7521
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/47492
Scores
EPSS
0.1255
EPSS Percentile
94.0%
Details
CWE
CWE-22
Status
published
Products (2)
webcamxp/webcamxp
5.3.2.375
webcamxp/webcamxp
5.3.2.410
Published
Jan 06, 2009
Tracked Since
Feb 18, 2026