Home

Description

A vulnerability was determined in lcg0124 BootDo up to 5ccd963c74058036b466e038cff37de4056c1600. Affected by this vulnerability is the function redirectToLogin of the file AccessControlFilter.java of the component Host Header Handler. This manipulation of the argument Hostname causes open redirect. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available.

PUBLISHED Reserved 2026-01-24 | Published 2026-01-25 | Updated 2026-02-23 | Assigner VulDB




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P
LOW: 3.5CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R
LOW: 3.5CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R
4.0AV:N/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:ND/RC:UR

Problem types

Open Redirect

Product status

Any version
affected

Timeline

2026-01-24:Advisory disclosed
2026-01-24:VulDB entry created
2026-01-26:VulDB entry last update

Credits

Tom132432 (VulDB User) reporter

References

vuldb.com/?id.342794 (VDB-342794 | lcg0124 BootDo Host Header AccessControlFilter.java redirectToLogin) vdb-entry technical-description

vuldb.com/?ctiid.342794 (VDB-342794 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.736271 (Submit #736271 | BootDo web V1.0 Host header injection) third-party-advisory

github.com/webzzaa/CVE-/issues/5 exploit issue-tracking

cve.org (CVE-2026-1406)

nvd.nist.gov (CVE-2026-1406)

Download JSON