Plattform
linux
Komponente
voltronic-power-snmp-web-pro
Behoben in
1.1.1
CVE-2026-22199 describes a pre-authentication path traversal vulnerability found in Voltronic Power SNMP Web Pro versions 1.1. This flaw allows attackers to read arbitrary files on the device's filesystem without authentication. Successful exploitation could lead to the disclosure of sensitive information, potentially enabling full system compromise. The vulnerability was published on 2026-03-13 and a fix is available in version 7.6.47.
The path traversal vulnerability in Voltronic Power SNMP Web Pro allows unauthenticated attackers to bypass access controls and directly read files on the device. By crafting malicious requests to the upload.cgi endpoint with directory traversal sequences in the params parameter (e.g., ../../../../etc/passwd), an attacker can access files they would otherwise not be authorized to view. The most critical impact is the potential exposure of password hashes, which, if obtained, could be cracked offline to gain root-level access. This would grant the attacker complete control over the device, including the ability to modify configurations, install malware, and potentially pivot to other systems on the network. The lack of authentication required for exploitation significantly broadens the attack surface.
CVE-2026-22199 was publicly disclosed on March 13, 2026. Currently, there is no indication of active exploitation campaigns targeting this vulnerability. No public proof-of-concept (PoC) code has been released, but the simplicity of the vulnerability suggests that it is likely to be exploited once a PoC becomes available. The vulnerability has not been added to the CISA KEV catalog as of this writing.
Organizations utilizing Voltronic Power SNMP Web Pro version 1.1 for network management are at risk. This includes deployments in industrial control systems (ICS) and building automation systems where SNMP is commonly used for device monitoring and configuration. Shared hosting environments that utilize this software are particularly vulnerable due to the potential for cross-tenant exploitation.
• linux / server:
journalctl -u snmpwebpro | grep -i "upload.cgi"• linux / server:
lsof | grep upload.cgi | grep /tmp• generic web:
curl -I 'http://<target_ip>/upload.cgi?params=../../../../etc/passwd' # Check for 200 OK response indicating file accessdisclosure
Exploit-Status
EPSS
0.04% (10% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2026-22199 is to upgrade Voltronic Power SNMP Web Pro to version 7.6.47 or later, which contains the fix. If an immediate upgrade is not possible due to compatibility concerns or system downtime requirements, consider implementing temporary workarounds. Restrict access to the upload.cgi endpoint using a Web Application Firewall (WAF) or proxy server, blocking requests containing directory traversal sequences. Regularly review and audit file permissions on the device to ensure only authorized users have access to sensitive files. Monitor system logs for suspicious activity, particularly attempts to access files outside of expected directories.
Actualice el dispositivo a una versión corregida proporcionada por Voltronic Power. Verifique el sitio web oficial de Voltronic Power o contacte con su soporte técnico para obtener información sobre las actualizaciones disponibles. Como medida temporal, desactive la funcionalidad de carga de archivos hasta que se pueda aplicar una actualización.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2026-22199 is a vulnerability allowing unauthenticated attackers to read arbitrary files on Voltronic Power SNMP Web Pro version 1.1, potentially exposing sensitive data like password hashes.
You are affected if you are using Voltronic Power SNMP Web Pro version 1.1. Upgrade to version 7.6.47 or later to mitigate the risk.
Upgrade to version 7.6.47 or later. As a temporary workaround, restrict access to the upload.cgi endpoint using a firewall or proxy.
While no active exploitation has been confirmed, the ease of exploitation suggests it is likely to be targeted.
Refer to the Voltronic Power website for the official advisory and further details regarding this vulnerability.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.