Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2019-18922 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Path Traversal in Allied Telesis AT-GS950/8 Web Interface. πŸ“‰ **Consequences**: Attackers can access files outside restricted directories. Critical risk of sensitive data exposure.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: Improper filtering of special characters in resource/file paths. πŸ› **Flaw**: The system fails to sanitize inputs, allowing directory traversal sequences (e.g., `../`).

Q3Who is affected? (Versions/Components)

🏒 **Vendor**: Allied Telesis (Japan). πŸ“¦ **Product**: AT-GS950/8 Switch. ⚠️ **Affected**: Firmware versions **before** 1.00.047 (or AT-S107 V.1.1.3).

Q4What can hackers do? (Privileges/Data)

πŸ’» **Hackers' Power**: Read arbitrary files from the device. πŸ“‚ **Data Risk**: Access configuration files, logs, or potentially credentials stored outside the web root. No execution mentioned, but high info-leak risk.

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Threshold**: Likely Low-Medium. βš™οΈ **Config**: Exploits the **Web Interface**. If the web UI is accessible (even without auth, or with default creds), exploitation is trivial via HTTP requests.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ” **Public Exp?**: Yes. πŸ“œ **PoC**: Available via Nuclei templates (ProjectDiscovery) and PacketStorm. 🌐 **Status**: Active proof-of-concept exists; easy to automate.

Q7How to self-check? (Features/Scanning)

πŸ”Ž **Self-Check**: Scan for the specific Web Interface. πŸ§ͺ **Test**: Send crafted HTTP requests with path traversal payloads (`../../etc/passwd` style) to the web UI endpoints. Check for file content in response.

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed?**: Yes. πŸ› οΈ **Patch**: Upgrade firmware to **1.00.047** or later (specifically AT-S107 V.1.1.3+). Contact Allied Telesis for the official update.

Q9What if no patch? (Workaround)

🚧 **No Patch?**: 1. Disable the Web Management Interface if not needed. πŸ”’ 2. Restrict access via Firewall/ACLs to trusted IPs only. 3. Change default credentials immediately.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: HIGH. πŸš€ **Priority**: Patch immediately. Since PoCs are public and it affects network infrastructure (switches), the risk of reconnaissance or data theft is significant. Don't wait!