Path Traversal vulnerability in Digitek ADT1100 and Digitek DT950 from PRIMION DIGITEK, S.L.U (Azkoyen Group). This vulnerability allows an attacker to access arbitrary files in the server's file system, thet is, 'http://<host>/..%2F..% 2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd'. By manipulating the input to include URL encoded directory traversal sequences (e.g., %2F representing /), an attacker can bypass the input validation mechanisms ans retrieve sensitive files outside the intended directory, which could lead to information disclosure or further system compromise.
Metrics
Affected Vendors & Products
References
History
Thu, 05 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 05 Feb 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Path Traversal vulnerability in Digitek ADT1100 and Digitek DT950 from PRIMION DIGITEK, S.L.U (Azkoyen Group). This vulnerability allows an attacker to access arbitrary files in the server's file system, thet is, 'http://<host>/..%2F..% 2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd'. By manipulating the input to include URL encoded directory traversal sequences (e.g., %2F representing /), an attacker can bypass the input validation mechanisms ans retrieve sensitive files outside the intended directory, which could lead to information disclosure or further system compromise. | |
| Title | Path Traversal in Digitek from Grupo Azkoyen | |
| First Time appeared |
Primion Digitek
Primion Digitek digitek Adt1100 Primion Digitek digitek Dt950 |
|
| Weaknesses | CWE-22 | |
| CPEs | cpe:2.3:a:primion_digitek:digitek_adt1100:all_versions:*:*:*:*:*:*:* cpe:2.3:a:primion_digitek:digitek_dt950:all_versions:*:*:*:*:*:*:* |
|
| Vendors & Products |
Primion Digitek
Primion Digitek digitek Adt1100 Primion Digitek digitek Dt950 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2026-02-05T14:29:09.926Z
Reserved: 2026-01-28T10:54:43.233Z
Link: CVE-2026-1523
Updated: 2026-02-05T14:26:33.334Z
Status : Awaiting Analysis
Published: 2026-02-05T14:16:04.420
Modified: 2026-02-05T14:57:20.563
Link: CVE-2026-1523
No data.