Home

Description

A path traversal vulnerability exists in the /IDC_Logging/checkifdone.cgi script in International Datacasting Corporation (IDC) SFX Series SuperFlex Satellite Receiver Web management portal version 101. An authenticated attacker can manipulate the `file` parameter to traverse directories and enumerate arbitrary files on the underlying filesystem. Due to the insecure perl file path handling function in use, a authenticated actor is able to preform directory traversal, with the backup endpoint confirming a file exists by indicating that a backup operation was successful or when using the path of a non existent file, the returned status is failed.

PUBLISHED Reserved 2026-03-03 | Published 2026-03-04 | Updated 2026-03-04 | Assigner Gridware




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

Default status
unknown

101
unaffected

Credits

Abdul Mhanni finder

References

www.abdulmhsblog.com/posts/spfx-vulnrabilities/

cve.org (CVE-2026-28769)

nvd.nist.gov (CVE-2026-28769)

Download JSON