Ruijie Networks Switch eWeb S29_RGOS 11.4 contains a directory traversal vulnerability that allows unauthenticated attackers to access sensitive configuration files by manipulating file path parameters. Attackers can exploit the /download.do endpoint with '../' sequences to retrieve system configuration files containing credentials and network settings.
Metrics
Affected Vendors & Products
References
History
Thu, 29 Jan 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 29 Jan 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Ruijie Networks Switch eWeb S29_RGOS 11.4 contains a directory traversal vulnerability that allows unauthenticated attackers to access sensitive configuration files by manipulating file path parameters. Attackers can exploit the /download.do endpoint with '../' sequences to retrieve system configuration files containing credentials and network settings. | |
| Title | Ruijie Networks Switch eWeb S29_RGOS 11.4 - Directory Traversal | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-01-29T15:14:28.309Z
Reserved: 2026-01-28T18:18:30.521Z
Link: CVE-2020-37015
Updated: 2026-01-29T15:14:22.113Z
Status : Awaiting Analysis
Published: 2026-01-29T15:16:08.907
Modified: 2026-01-29T16:31:00.867
Link: CVE-2020-37015
No data.
OpenCVE Enrichment
No data.