CVE-2013-10062
Linksys Routers apply.cgi Path Traversal
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
A directory traversal vulnerability exists in Linksys router's web interface (tested on the E1500 model firmware versions 1.0.00, 1.0.04, and 1.0.05), specifically in the /apply.cgi endpoint. Authenticated attackers can exploit the next_page POST parameter to access arbitrary files outside the intended web root by injecting traversal sequences. This allows exposure of sensitive system files and configuration data.
| CWE | CWE-22 |
| Vendor | linksys |
| Product | e1500 |
| Published | Aug 1, 2025 |
| Last Updated | Apr 7, 2026 |
Stay Ahead of the Next One
Get instant alerts for linksys e1500
Be the first to know when new unknown vulnerabilities affecting linksys e1500 are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linksys / E1500
1.0.00 1.0.04 1.0.05
References
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/scanner/http/linksys_e1500_traversal.rb exploit-db.com: https://www.exploit-db.com/exploits/24475 web.archive.org: https://web.archive.org/web/20150428184015/http://www.s3cur1ty.de/m1adv2013-004 vulncheck.com: https://www.vulncheck.com/advisories/linksys-legacy-routers-path-traversal
Credits
Michael Messner