Home

Description

ZKTeco ZKBioSecurity 3.0 contains a file path manipulation vulnerability that allows attackers to access arbitrary files by modifying file paths used to retrieve local resources. Attackers can manipulate path parameters to bypass access controls and retrieve sensitive information including configuration files, source code, and protected application resources.

PUBLISHED Reserved 2026-03-15 | Published 2026-03-15 | Updated 2026-03-16 | Assigner VulnCheck




MEDIUM: 6.9CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
MEDIUM: 6.2CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

Incorrect Default Permissions

Product status

3.0.1.0_R_230
affected

Credits

LiquidWorm as Gjoko Krstic of Zero Science Lab finder

References

www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5365.php (Zero Science Lab Disclosure) third-party-advisory

cxsecurity.com/issue/WLB-2016090001 (CXSecurity) third-party-advisory

exchange.xforce.ibmcloud.com/vulnerabilities/116489 (IBM X-Force Exchange) vdb-entry

packetstormsecurity.com/files/138570 (Packet Storm Security) exploit

www.exploit-db.com/exploits/40326/ (Reference) exploit

www.vulncheck.com/...ty-file-path-manipulation-vulnerability (VulnCheck Advisory: ZKTeco ZKBioSecurity 3.0 File Path Manipulation Vulnerability) third-party-advisory

cve.org (CVE-2016-20029)

nvd.nist.gov (CVE-2016-20029)

Download JSON