Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 04 Dec 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Mon, 17 Nov 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Advantech webaccess\/vpn
|
|
| CPEs | cpe:2.3:a:advantech:webaccess\/vpn:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Advantech webaccess\/vpn
|
Fri, 07 Nov 2025 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Advantech
Advantech webaccess/vpn |
|
| Vendors & Products |
Advantech
Advantech webaccess/vpn |
Thu, 06 Nov 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 06 Nov 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Advantech WebAccess/VPN versions prior to 1.1.5 contain an absolute path traversal via AjaxStandaloneVpnClientsController.ajaxDownloadRoadWarriorConfigFileAction() that allows an authenticated network administrator to cause the application to read and return the contents of arbitrary files the web user (www-data) can access. | |
| Title | Advantech WebAccess/VPN < 1.1.5 Path Traversal via AjaxStandaloneVpnClientsController.ajaxDownloadRoadWarriorConfigFileAction() | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-11-17T19:38:10.021Z
Reserved: 2025-04-15T19:15:22.575Z
Link: CVE-2025-34238
Updated: 2025-11-06T20:23:58.946Z
Status : Analyzed
Published: 2025-11-06T20:15:47.587
Modified: 2025-12-04T21:26:53.130
Link: CVE-2025-34238
No data.
OpenCVE Enrichment
Updated: 2025-11-07T10:54:10Z