CVE-2020-36909
Severity CVSS v4.0:
HIGH
Type:
CWE-22
Path Traversal
Publication date:
06/01/2026
Last modified:
23/02/2026
Description
SnapGear Management Console SG560 3.1.5 contains a file manipulation vulnerability that allows authenticated users to read, write, and delete files using the edit_config_files CGI script. Attackers can manipulate POST request parameters in /cgi-bin/cgix/edit_config_files to access and modify files outside the intended /etc/config/ directory.
Impact
Base Score 4.0
8.70
Severity 4.0
HIGH
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:securecomputing:snapgear_sg560_firmware:3.1.5:*:*:*:*:*:*:* | ||
| cpe:2.3:h:securecomputing:snapgear_sg560:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://exchange.xforce.ibmcloud.com/vulnerabilities/182960
- https://packetstorm.news/files/id/157939
- https://www.exploit-db.com/exploits/48556
- https://www.vulncheck.com/advisories/secure-computing-snapgear-management-console-sg-arbitrary-file-readwrite
- https://www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5568.php



