Ruijie Networks Switch eWeb S29_RGOS 11.4 contains a directory traversal vulnerability that allows unauthenticated attackers to access sensitive configuration files by manipulating file path parameters. Attackers can exploit the /download.do endpoint with '../' sequences to retrieve system configuration files containing credentials and network settings.
Metrics
Affected Vendors & Products
References
History
Fri, 30 Jan 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ruijienetworks
Ruijienetworks switch Eweb S29 Rgos |
|
| Vendors & Products |
Ruijienetworks
Ruijienetworks switch Eweb S29 Rgos |
Thu, 29 Jan 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 29 Jan 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Ruijie Networks Switch eWeb S29_RGOS 11.4 contains a directory traversal vulnerability that allows unauthenticated attackers to access sensitive configuration files by manipulating file path parameters. Attackers can exploit the /download.do endpoint with '../' sequences to retrieve system configuration files containing credentials and network settings. | |
| Title | Ruijie Networks Switch eWeb S29_RGOS 11.4 - Directory Traversal | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-01-29T14:28:32.271Z
Updated: 2026-01-29T15:14:28.309Z
Reserved: 2026-01-28T18:18:30.521Z
Link: CVE-2020-37015
Updated: 2026-01-29T15:14:22.113Z
Status : Awaiting Analysis
Published: 2026-01-29T15:16:08.907
Modified: 2026-01-29T16:31:00.867
Link: CVE-2020-37015
No data.