Home

Description

Navtor NavBox allows information disclosure via the /api/ais-data endpoint. A remote, unauthenticated attacker can send crafted requests to trigger an unhandled exception, causing the server to return verbose .NET stack traces. These error messages expose internal class names, method calls, and third-party library references (e.g., System.Data.SQLite), which may assist attackers in mapping the application's internal structure.

PUBLISHED Reserved 2026-02-19 | Published 2026-03-06 | Updated 2026-03-09 | Assigner MHV




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Problem types

CWE-209 Generation of Error Message Containing Sensitive Information

Product status

Default status
unaffected

4.12.0.3
affected

4.16.2.4
unaffected

Credits

Cydome Security Ltd finder

References

cydome.io/...cve-2026-2752-in-navtor-navbox-version-4-12-0-3 technical-description

cve.org (CVE-2026-2752)

nvd.nist.gov (CVE-2026-2752)

Download JSON