Description
A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges to bypass the path traversal checks and delete an arbitrary file potentially resulting in a reboot to factory default settings.
Published: 2025-05-07
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-13910 A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges to bypass the path traversal checks and delete an arbitrary file potentially resulting in a reboot to factory default settings.
History

Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00111}

epss

{'score': 0.00129}


Mon, 19 May 2025 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Sonicwall
Sonicwall sma 100
Sonicwall sma 100 Firmware
Sonicwall sma 200
Sonicwall sma 200 Firmware
Sonicwall sma 210
Sonicwall sma 210 Firmware
Sonicwall sma 400
Sonicwall sma 400 Firmware
Sonicwall sma 410
Sonicwall sma 410 Firmware
Sonicwall sma 500v
Sonicwall sma 500v Firmware
CPEs cpe:2.3:h:sonicwall:sma_100:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:sma_200:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:sma_210:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:sma_400:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:sma_410:-:*:*:*:*:*:*:*
cpe:2.3:h:sonicwall:sma_500v:-:*:*:*:*:*:*:*
cpe:2.3:o:sonicwall:sma_100_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:sonicwall:sma_200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:sonicwall:sma_210_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:sonicwall:sma_400_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:sonicwall:sma_410_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:sonicwall:sma_500v_firmware:*:*:*:*:*:*:*:*
Vendors & Products Sonicwall
Sonicwall sma 100
Sonicwall sma 100 Firmware
Sonicwall sma 200
Sonicwall sma 200 Firmware
Sonicwall sma 210
Sonicwall sma 210 Firmware
Sonicwall sma 400
Sonicwall sma 400 Firmware
Sonicwall sma 410
Sonicwall sma 410 Firmware
Sonicwall sma 500v
Sonicwall sma 500v Firmware

Mon, 12 May 2025 14:15:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 07 May 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 07 May 2025 18:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Wed, 07 May 2025 17:30:00 +0000

Type Values Removed Values Added
Description A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges to bypass the path traversal checks and delete an arbitrary file potentially resulting in a reboot to factory default settings.
Weaknesses CWE-552
References

Subscriptions

Sonicwall Sma 100 Sma 100 Firmware Sma 200 Sma 200 Firmware Sma 210 Sma 210 Firmware Sma 400 Sma 400 Firmware Sma 410 Sma 410 Firmware Sma 500v Sma 500v Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: sonicwall

Published:

Updated: 2026-02-26T18:28:50.031Z

Reserved: 2025-04-11T08:50:31.683Z

Link: CVE-2025-32819

cve-icon Vulnrichment

Updated: 2025-05-07T17:30:23.906Z

cve-icon NVD

Status : Analyzed

Published: 2025-05-07T18:15:42.560

Modified: 2025-05-19T15:13:46.003

Link: CVE-2025-32819

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses