We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges to bypass the path traversal checks and delete an arbitrary file potentially resulting in a reboot to factory default settings.
Reserved 2025-04-11 | Published 2025-05-07 | Updated 2025-05-13 | Assigner sonicwallCWE-552 Files or Directories Accessible to External Parties
psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0011
Support options