Description
IntelBras Telefone IP TIP200 and 200 LITE contain an unauthenticated arbitrary file read vulnerability in the dumpConfigFile function accessible via the cgiServer.exx endpoint. Attackers can send GET requests to /cgi-bin/cgiServer.exx with the command parameter containing dumpConfigFile() to read sensitive files including /etc/shadow and configuration files without proper authorization.
Exploits (1)
References (3)
Core 3
Core References
Exploit, Third Party Advisory exploit
https://www.exploit-db.com/exploits/47337
Various Sources product
https://backend.intelbras.com/sites/default/files/integration/lamina_tip-200-lite_e_tip-200.pdf
Third Party Advisory third-party-advisory
https://www.vulncheck.com/advisories/intelbras-telefone-ip-tip200-200-lite-arbitrary-file-read-via-dumpconfigfile
Scores
CVSS v3
7.5
EPSS
0.0004
EPSS Percentile
12.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-73
Status
published
Products (2)
Intelbras/Telefone IP TIP 200
Intelbras/Telefone IP TIP 200 LITE
Published
Mar 11, 2026
Tracked Since
Mar 12, 2026