Authenticated Remote Directory Traversal Vulnerability in MikroTik RouterOS

Authenticated Remote Directory Traversal Vulnerability in MikroTik RouterOS

CVE-2019-3943 · HIGH Severity

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

MikroTik RouterOS versions Stable 6.43.12 and below, Long-term 6.42.12 and below, and Testing 6.44beta75 and below are vulnerable to an authenticated, remote directory traversal via the HTTP or Winbox interfaces. An authenticated, remote attack can use this vulnerability to read and write files outside of the sandbox directory (/rw/disk).

Learn more about our Web Application Penetration Testing UK.