The exploit demonstrates a local file disclosure vulnerability in EyeLock nano NXT due to improper input validation in the 'logdownload.php' script. Attackers can read arbitrary files by manipulating the 'path' parameter.
Classification
Working Poc 100%
Attack Type
Info Leak
Complexity
Trivial
Reliability
Reliable
Target:EyeLock nano NXT Firmware 3.05.1193 (ICM: 3.5.1) and earlier
No auth needed
Prerequisites:Network access to the vulnerable device