CVE-2026-1523

N/A Unknown

📋 TL;DR

A path traversal vulnerability in Digitek ADT1100 and DT950 devices allows attackers to access arbitrary files on the server's file system by manipulating URL parameters with encoded directory traversal sequences. This affects PRIMION DIGITEK, S.L.U (Azkoyen Group) devices, potentially exposing sensitive system files like /etc/passwd.

💻 Affected Systems

Products:
  • Digitek ADT1100
  • Digitek DT950
Versions: All versions prior to patch
Operating Systems: Embedded Linux systems
Default Config Vulnerable: ⚠️ Yes
Notes: Devices with web interfaces exposed to network are vulnerable by default.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through credential theft, configuration file access, and potential privilege escalation leading to full device control.

🟠

Likely Case

Information disclosure of sensitive files including passwords, configuration data, and system information that could enable further attacks.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external exploitation attempts.

🌐 Internet-Facing: HIGH - Direct web interface access allows unauthenticated file retrieval from external networks.
🏢 Internal Only: MEDIUM - Internal attackers could still exploit this, but network segmentation reduces exposure.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple URL manipulation with encoded traversal sequences (%2F for /) bypasses input validation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/path-traversal-digitek-grupo-azkoyen

Restart Required: Yes

Instructions:

1. Contact PRIMION DIGITEK/Azkoyen Group for firmware updates 2. Apply vendor-provided patches 3. Restart affected devices 4. Verify patch effectiveness

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict network access to device web interfaces using firewall rules

iptables -A INPUT -p tcp --dport 80 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

Web Server Configuration

all

Configure web server to reject URLs containing directory traversal sequences

Add URL filtering rules in web server configuration to block patterns containing ..%2F, %2F.., etc.

🧯 If You Can't Patch

  • Isolate affected devices in separate VLAN with strict access controls
  • Implement WAF rules to block path traversal patterns at network perimeter

🔍 How to Verify

Check if Vulnerable:

Attempt to access http://<device_ip>/..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd and check if system files are returned

Check Version:

Check device web interface or console for firmware version information

Verify Fix Applied:

Attempt the same traversal attack after patching - should return error or access denied

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing ..%2F patterns
  • Multiple failed attempts to access system directories
  • Unusual file access patterns from single IP

Network Indicators:

  • HTTP GET requests with encoded slashes in URL paths
  • Traffic to device web interfaces from unexpected sources

SIEM Query:

source="web_logs" AND (url="*..%2F*" OR url="*%2F..*")

🔗 References

📤 Share & Export