An attacker may perform unauthenticated read and write operations on sensitive filesystem areas via the AppEngine Fileaccess over HTTP due to improper access restrictions. A critical filesystem directory was unintentionally exposed through the HTTP-based file access feature, allowing access without authentication. This includes device parameter files, enabling an attacker to read and modify application settings, including customer-defined passwords. Additionally, exposure of the custom application directory may allow execution of arbitrary Lua code within the sandboxed AppEngine environment.
References
Configurations
No configuration.
History
06 Mar 2026, 08:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-06 08:16
Updated : 2026-03-06 08:16
NVD link : CVE-2026-2331
Mitre link : CVE-2026-2331
CVE.ORG link : CVE-2026-2331
JSON object : View
Products Affected
No product.
CWE
CWE-552
Files or Directories Accessible to External Parties
