CVE-2022-31793
HIGH EXPLOITED NUCLEIInglorion Muhttpd < 1.1.7 - Path Traversal
Title source: ruleDescription
do_request in request.c in muhttpd before 1.1.7 allows remote attackers to read arbitrary files by constructing a URL with a single character before a desired path on the filesystem. This occurs because the code skips over the first character when serving files. Arris NVG443, NVG599, NVG589, and NVG510 devices and Arris-derived BGW210 and BGW320 devices are affected.
Exploits (1)
Nuclei Templates (1)
muhttpd <=1.1.5 - Local Inclusion
HIGHVERIFIEDby scent2d
References (5)
Scores
CVSS v3
7.5
EPSS
0.9382
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
VulnCheck KEV
2023-11-13
CWE
CWE-22
Status
published
Products (7)
arris/bgw210_firmware
arris/bgw320_firmware
arris/nvg443_firmware
arris/nvg510_firmware
arris/nvg589_firmware
arris/nvg599_firmware
inglorion/muhttpd
< 1.1.7
Published
Aug 04, 2022
Tracked Since
Feb 18, 2026