Project Subscriptions
No advisories yet.
Solution
The vulnerability has been fixed in the latest version of the affected products.
Workaround
No workaround given by the vendor.
Thu, 05 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 05 Feb 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Path Traversal vulnerability in Digitek ADT1100 and Digitek DT950 from PRIMION DIGITEK, S.L.U (Azkoyen Group). This vulnerability allows an attacker to access arbitrary files in the server's file system, thet is, 'http://<host>/..%2F..% 2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd'. By manipulating the input to include URL encoded directory traversal sequences (e.g., %2F representing /), an attacker can bypass the input validation mechanisms ans retrieve sensitive files outside the intended directory, which could lead to information disclosure or further system compromise. | |
| Title | Path Traversal in Digitek from Grupo Azkoyen | |
| First Time appeared |
Primion Digitek
Primion Digitek digitek Adt1100 Primion Digitek digitek Dt950 |
|
| Weaknesses | CWE-22 | |
| CPEs | cpe:2.3:a:primion_digitek:digitek_adt1100:all_versions:*:*:*:*:*:*:* cpe:2.3:a:primion_digitek:digitek_dt950:all_versions:*:*:*:*:*:*:* |
|
| Vendors & Products |
Primion Digitek
Primion Digitek digitek Adt1100 Primion Digitek digitek Dt950 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2026-02-05T14:29:09.926Z
Reserved: 2026-01-28T10:54:43.233Z
Link: CVE-2026-1523
Updated: 2026-02-05T14:26:33.334Z
Status : Awaiting Analysis
Published: 2026-02-05T14:16:04.420
Modified: 2026-02-05T14:57:20.563
Link: CVE-2026-1523
No data.
OpenCVE Enrichment
No data.