A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges to bypass the path traversal checks and delete an arbitrary file potentially resulting in a reboot to factory default settings.
2025-05-07T18:15:42.560
2025-05-19T15:13:46.003
Analyzed
CVSSv3.1: 8.8 (HIGH)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | sonicwall | sma_100_firmware | < 10.2.1.15-81sv | Yes |
Hardware | sonicwall | sma_100 | - | No |
Operating System | sonicwall | sma_200_firmware | < 10.2.1.15-81sv | Yes |
Hardware | sonicwall | sma_200 | - | No |
Operating System | sonicwall | sma_210_firmware | < 10.2.1.15-81sv | Yes |
Hardware | sonicwall | sma_210 | - | No |
Operating System | sonicwall | sma_400_firmware | < 10.2.1.15-81sv | Yes |
Hardware | sonicwall | sma_400 | - | No |
Operating System | sonicwall | sma_410_firmware | < 10.2.1.15-81sv | Yes |
Hardware | sonicwall | sma_410 | - | No |
Operating System | sonicwall | sma_500v_firmware | < 10.2.1.15-81sv | Yes |
Hardware | sonicwall | sma_500v | - | No |