Description
Setelsa Conacwin v3.7.1.2 is vulnerable to a local file inclusion vulnerability. This vulnerability allows a remote unauthenticated attacker to read internal files on the server via an http:IP:PORT/../../path/file_to_disclose Directory Traversal URI. NOTE: The manufacturer indicated that the affected version does not exist. Furthermore, they indicated that they detected this problem in an internal audit more than 3 years ago and fixed it in 2017.
Exploits (1)
References (3)
Core 3
Core References
Exploit, Third Party Advisory x_refsource_misc
https://www.youtube.com/watch?v=CLAHE0qUHXs
Vendor Advisory x_refsource_misc
http://setelsa-security.es/productos/control-de-acceso/
Third Party Advisory x_refsource_misc
https://github.com/bryanroma/CVE-2020-25068
Scores
CVSS v3
7.5
EPSS
0.1519
EPSS Percentile
94.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
CWE
CWE-22
Status
published
Products (1)
setelsa-security/conacwin
3.7.1.2
Published
Sep 03, 2020
Tracked Since
Feb 18, 2026