Impact
Authenticated users can trigger the /cgi-bin/backup.cgi endpoint with a crafted remove ARCHIVE value that includes directory‑traversal sequences. The input is concatenated into a file path without sanitization and passed to an unlink() system call, allowing the deletion of arbitrary files on the firewall’s filesystem. This can compromise configuration, log, or system files and could disrupt firewall operation.
Affected Systems
The flaw affects Endian Firewall products, specifically version 2.1.2, all 2.4 releases, and any release up to and including 3.3.25. Users running these or older releases should verify their version and acknowledge that the vulnerability remains present.
Risk and Exploitability
The score of 7.1 indicates high severity. Exploitation requires authentication to the web interface, and the vulnerability is not listed in the known exploited vulnerabilities catalog. The likely attack path involves a web request crafted by an authenticated user to /cgi-bin/backup.cgi with a malicious remove ARCHIVE parameter, enabling arbitrary file deletion.
OpenCVE Enrichment