The locally served web site on the Garmin WDU (v1 1.4.6 and v2 5.0) allows a symlink attack. If a malicious graphics package containing symlinks is uploaded, the web server follows the supplied links when serving content. No mechanisms to restrict those link targets to a specific area of the filesystem is enabled. This allows an attacker to retrieve arbitrary files from the device.
Metrics
Affected Vendors & Products
References
History
Thu, 14 May 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-59 | |
| Metrics |
cvssV3_1
|
Wed, 13 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Arbitrary File Disclosure via Symlink Attack on Garmin WDU Local Web Server | |
| Weaknesses | CWE-22 |
Wed, 13 May 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The locally served web site on the Garmin WDU (v1 1.4.6 and v2 5.0) allows a symlink attack. If a malicious graphics package containing symlinks is uploaded, the web server follows the supplied links when serving content. No mechanisms to restrict those link targets to a specific area of the filesystem is enabled. This allows an attacker to retrieve arbitrary files from the device. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-14T15:38:30.029Z
Reserved: 2025-03-09T00:00:00.000Z
Link: CVE-2025-27850
Updated: 2026-05-14T15:36:05.666Z
Status : Received
Published: 2026-05-13T21:16:41.100
Modified: 2026-05-14T16:16:18.630
Link: CVE-2025-27850
No data.
OpenCVE Enrichment
Updated: 2026-05-13T21:30:04Z