SunFounder Pironman Dashboard (pm_dashboard) version 1.3.13 and prior contain a path traversal vulnerability in the log file API endpoints. An unauthenticated remote attacker can supply traversal sequences via the filename parameter to read and delete arbitrary files. Successful exploitation can disclose sensitive information and delete critical system files, resulting in data loss and potential system compromise or denial of service.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sun, 01 Feb 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SunFounder Pironman Dashboard (pm_dashboard) version 1.3.13 and prior contain a path traversal vulnerability in the log file API endpoints. An unauthenticated remote attacker can supply traversal sequences via the filename parameter to read and delete arbitrary files. Successful exploitation can disclose sensitive information and delete critical system files, resulting in data loss and potential system compromise or denial of service. | |
| Title | SunFounder Pironman Dashboard <= 1.3.13 Path Traversal Arbitrary File Read/Deletion | |
| Weaknesses | CWE-22 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-01-31T23:46:59.669Z
Reserved: 2026-01-28T21:47:35.120Z
Link: CVE-2026-25069
No data.
Status : Received
Published: 2026-02-01T00:16:19.107
Modified: 2026-02-01T00:16:19.107
Link: CVE-2026-25069
No data.
OpenCVE Enrichment
No data.
Weaknesses