Impact
A path traversal flaw was discovered in elecV2P’s Wildcard Handler. The bug is triggered by the path.join function in the /log/ component and allows an attacker to construct file paths that resolve outside the intended log directory. The result is the disclosure of arbitrary files on the host filesystem, potentially revealing confidential information and opening the door to further compromise.
Affected Systems
All releases of elecV2P up to version 3.8.3 contain the vulnerable Wildcard Handler module. The flaw resides in the construction of log file paths within the /log/ directory of the elecV2 vendor’s software.
Risk and Exploitability
The vulnerability carries a CVSS score of 6.9, indicating medium severity. Exploitation requires only network access to the vulnerable component and does not need authentication. A public exploit exists, increasing the likelihood of real‑world attacks. The EPSS score is not available, and the flaw is not listed in the CISA KEV catalog, but the combination of remote exploitability and public availability suggests a significant risk.
OpenCVE Enrichment