Description
Local file inclusion in Pyrescom Termod4 time management devices before 10.04k allows authenticated remote attackers to traverse directories and read sensitive files via the Maintenance > Logs menu and manipulating the file-path in the URL.
References (3)
Core 3
Core References
Product, Vendor Advisory x_refsource_misc
https://pyres.com/en/solutions/termod-4/
Exploit, Third Party Advisory x_refsource_misc
https://github.com/Outpost24/Pyrescom-Termod-PoC
Exploit, Third Party Advisory x_refsource_misc
https://outpost24.com/blog/multiple-vulnerabilities-discovered-in-Pyrescom-Termod4-smart-device
Scores
CVSS v3
6.5
EPSS
0.0061
EPSS Percentile
69.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Details
CWE
CWE-22
Status
published
Products (1)
pyres/termod4_firmware
< 10.04k
Published
Jan 26, 2021
Tracked Since
Feb 18, 2026