Description
A path traversal vulnerability exists in the /IDC_Logging/checkifdone.cgi script in International Datacasting Corporation (IDC) SFX Series SuperFlex Satellite Receiver Web management portal version 101. An authenticated attacker can manipulate the `file` parameter to traverse directories and enumerate arbitrary files on the underlying filesystem. Due to the insecure perl file path handling function in use, a authenticated actor is able to preform directory traversal, with the backup endpoint confirming a file exists by indicating that a backup operation was successful or when using the path of a non existent file, the returned status is failed.
Published: 2026-03-04
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information disclosure via file existence enumeration through an authenticated web interface
Action: Assess Impact
AI Analysis

Impact

A path‑traversal vulnerability has been identified in the /IDC_Logging/checkifdone.cgi script of International Datacasting Corporation’s SFX Series SuperFlex Satellite Receiver web‑management portal. An authenticated user can manipulate the file parameter to navigate above the intended directory and reference arbitrary files on the device’s underlying filesystem. Because the Perl file‑handling routine does not sanitize the input, the backup endpoint returns a success status for existing files and a failure status for non‑existing files, allowing the attacker to confirm the presence of files. The flaw therefore provides a limited information‑disclosure capability of file existence enumeration.

Affected Systems

The issue affects the SFX Series SuperFlex Satellite Receiver Web Management Interface version 101, as shipped by International Datacasting Corporation. The vulnerability is present in the /IDC_Logging/checkifdone.cgi component of that firmware; no other versions or product lines are listed as affected.

Risk and Exploitability

The advisory assigns a CVSS v3 base score of 5.3, indicating moderate severity. The EPSS probability is less than 1 %, suggesting that while the vulnerability can be exploited, it is not among the most frequently attacked weaknesses. The flaw is not listed in the CISA KEV catalog, and no public exploits have been reported. An attacker must first obtain authenticated access to the web management interface; once authenticated, they can send crafted requests to enumerate files. By obtaining information about configuration or credential files, an attacker could move to further compromise if additional weaknesses exist.

Generated by OpenCVE AI on April 16, 2026 at 13:46 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check for and apply any firmware or patch release from IDC that addresses the path‑traversal issue in /IDC_Logging/checkifdone.cgi
  • Limit access to the web management interface by restricting it to trusted internal networks, VPNs, or firewall rules to reduce exposure to authenticated attackers
  • Implement strict role‑based access controls so that only authorized personnel retain credentials to log into the management portal

Generated by OpenCVE AI on April 16, 2026 at 13:46 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 09 Mar 2026 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Datacast
Datacast sfx2100
Datacast sfx2100 Firmware
CPEs cpe:2.3:h:datacast:sfx2100:-:*:*:*:*:*:*:*
cpe:2.3:o:datacast:sfx2100_firmware:-:*:*:*:*:*:*:*
Vendors & Products Datacast
Datacast sfx2100
Datacast sfx2100 Firmware
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Thu, 05 Mar 2026 06:30:00 +0000

Type Values Removed Values Added
References

Thu, 05 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
References

Wed, 04 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared International Datacasting Corporation (idc)
International Datacasting Corporation (idc) sfx Series Superflex Satellite Receiver Web Management Interface
Vendors & Products International Datacasting Corporation (idc)
International Datacasting Corporation (idc) sfx Series Superflex Satellite Receiver Web Management Interface

Wed, 04 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Mar 2026 08:30:00 +0000

Type Values Removed Values Added
Title LFI in /IDC_Logging/checkifdone.cgi, "file" parameter Allowing for File Existence Enumeration On IDC Satellite Receiver Web Management Interface Version 101

Wed, 04 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
Description A path traversal vulnerability exists in the /IDC_Logging/checkifdone.cgi script in International Datacasting Corporation (IDC) SFX Series SuperFlex Satellite Receiver Web management portal version 101. An authenticated attacker can manipulate the `file` parameter to traverse directories and enumerate arbitrary files on the underlying filesystem. Due to the insecure perl file path handling function in use, a authenticated actor is able to preform directory traversal, with the backup endpoint confirming a file exists by indicating that a backup operation was successful or when using the path of a non existent file, the returned status is failed.
Weaknesses CWE-22
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N'}


Subscriptions

Datacast Sfx2100 Sfx2100 Firmware
International Datacasting Corporation (idc) Sfx Series Superflex Satellite Receiver Web Management Interface
cve-icon MITRE

Status: PUBLISHED

Assigner: Gridware

Published:

Updated: 2026-03-05T05:58:29.757Z

Reserved: 2026-03-03T09:59:08.425Z

Link: CVE-2026-28769

cve-icon Vulnrichment

Updated: 2026-03-04T15:02:40.803Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-04T07:16:13.713

Modified: 2026-03-09T18:20:19.893

Link: CVE-2026-28769

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T14:00:19Z

Weaknesses