Description
A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges to bypass the path traversal checks and delete an arbitrary file potentially resulting in a reboot to factory default settings.
Problem types
CWE-552 Files or Directories Accessible to External Parties
Product status
10.2.1.14-75sv and earlier versions
References
old.rapid7.com/...bilities-in-sonicwall-sma-100-series-2025/
psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0011