SunFounder Pironman Dashboard (pm_dashboard) version 1.3.13 and prior contain a path traversal vulnerability in the log file API endpoints. An unauthenticated remote attacker can supply traversal sequences via the filename parameter to read and delete arbitrary files. Successful exploitation can disclose sensitive information and delete critical system files, resulting in data loss and potential system compromise or denial of service.
Metrics
Affected Vendors & Products
References
History
Tue, 03 Feb 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sunfounder
Sunfounder pironman Dashboard |
|
| Vendors & Products |
Sunfounder
Sunfounder pironman Dashboard |
Mon, 02 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 01 Feb 2026 07:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Sun, 01 Feb 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SunFounder Pironman Dashboard (pm_dashboard) version 1.3.13 and prior contain a path traversal vulnerability in the log file API endpoints. An unauthenticated remote attacker can supply traversal sequences via the filename parameter to read and delete arbitrary files. Successful exploitation can disclose sensitive information and delete critical system files, resulting in data loss and potential system compromise or denial of service. | |
| Title | SunFounder Pironman Dashboard <= 1.3.13 Path Traversal Arbitrary File Read/Deletion | |
| Weaknesses | CWE-22 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-01-31T23:46:59.669Z
Updated: 2026-02-02T20:02:08.707Z
Reserved: 2026-01-28T21:47:35.120Z
Link: CVE-2026-25069
Updated: 2026-02-02T20:02:04.558Z
Status : Awaiting Analysis
Published: 2026-02-01T00:16:19.107
Modified: 2026-02-03T16:44:36.630
Link: CVE-2026-25069
No data.