SunFounder Pironman Dashboard (pm_dashboard) version 1.3.13 and prior contain a path traversal vulnerability in the log file API endpoints. An unauthenticated remote attacker can supply traversal sequences via the filename parameter to read and delete arbitrary files. Successful exploitation can disclose sensitive information and delete critical system files, resulting in data loss and potential system compromise or denial of service.
Metrics
Affected Vendors & Products
References
History
Sun, 01 Feb 2026 07:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Sun, 01 Feb 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SunFounder Pironman Dashboard (pm_dashboard) version 1.3.13 and prior contain a path traversal vulnerability in the log file API endpoints. An unauthenticated remote attacker can supply traversal sequences via the filename parameter to read and delete arbitrary files. Successful exploitation can disclose sensitive information and delete critical system files, resulting in data loss and potential system compromise or denial of service. | |
| Title | SunFounder Pironman Dashboard <= 1.3.13 Path Traversal Arbitrary File Read/Deletion | |
| Weaknesses | CWE-22 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-01T06:28:08.069Z
Reserved: 2026-01-28T21:47:35.120Z
Link: CVE-2026-25069
No data.
Status : Received
Published: 2026-02-01T00:16:19.107
Modified: 2026-02-01T07:16:05.793
Link: CVE-2026-25069
No data.
OpenCVE Enrichment
No data.