Impact
A firmware flaw in the Small Cell Sercomm SCE4255W, accessed through /ftl/web/setup.cgi, permits authenticated remote users to manipulate the log_type query string to /logsave.htm and read any file on the device. This path traversal vulnerability, classified as CWE‑22, exposes system files and credentials to unauthorized disclosure.
Affected Systems
The issue covers Sercomm’s FreedomFi Englewood small‑cell module, the SCE4255W unit, and affects all firmware revisions prior to DG3934v3@2308041842. Any deployment using a vulnerable firmware version is subject to the described weakness.
Risk and Exploitability
The CVSS base score of 6.5 indicates a moderate severity and the EPSS score below 1 % suggests low current exploitation probability. Although the flaw is not listed in the CISA KeV catalog, it can still be leveraged by anyone who obtains valid administrative credentials and attempts to read sensitive system files. The main attack vector is remote authenticated access to the device, so restricting or disabling local administrative accounts and applying the latest firmware can eliminate the risk.
OpenCVE Enrichment