Path traversal vulnerability in FUJITSU Network Edgiot GW1500 (M2M-GW for FENICS) allows authenticated attacker to access restricted sensitive files and hijack Administrator Class privileges
Reporter | Title | Published | Views | Family All 6 |
---|---|---|---|---|
![]() | CVE-2024-40617 | 17 Jul 202409:15 | – | nvd |
![]() | Exploit for Path Traversal in Fujitsu Network Edgiot Gw1500 Firmware | 30 Jul 202411:50 | – | githubexploit |
![]() | JVN#25583987: FUJITSU Network Edgiot GW1500 vulnerable to path traversal | 16 Jul 202400:00 | – | jvn |
![]() | CVE-2024-40617 | 17 Jul 202408:44 | – | cvelist |
![]() | CVE-2024-40617 | 17 Jul 202408:44 | – | vulnrichment |
![]() | CVE-2024-40617 | 23 May 202507:47 | – | redhatcve |
[
{
"vendor": "Fujitsu Limited",
"product": "FUJITSU Network Edgiot GW1500 (M2M-GW for FENICS)",
"versions": [
{
"version": "prior to V02L19C01",
"status": "affected"
}
]
}
]
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo