Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25069: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in SunFounder Pironman Dashboard (pm_dashboard)

0
Critical
VulnerabilityCVE-2026-25069cvecve-2026-25069cwe-22
Published: Sat Jan 31 2026 (01/31/2026, 23:46:59 UTC)
Source: CVE Database V5
Vendor/Project: SunFounder
Product: Pironman Dashboard (pm_dashboard)

Description

SunFounder Pironman Dashboard (pm_dashboard) version 1.3.13 and prior contain a path traversal vulnerability in the log file API endpoints. An unauthenticated remote attacker can supply traversal sequences via the filename parameter to read and delete arbitrary files. Successful exploitation can disclose sensitive information and delete critical system files, resulting in data loss and potential system compromise or denial of service.

AI-Powered Analysis

AILast updated: 02/01/2026, 00:12:06 UTC

Technical Analysis

CVE-2026-25069 is a path traversal vulnerability classified under CWE-22 affecting SunFounder Pironman Dashboard (pm_dashboard) versions up to 1.3.13. The vulnerability exists in the log file API endpoints where the filename parameter is improperly sanitized, allowing an attacker to supply directory traversal sequences (e.g., '../') to access files outside the intended restricted directory. Because the API is accessible without authentication, a remote attacker can exploit this flaw to read sensitive files such as configuration files, credentials, or logs, and also delete arbitrary files on the system. This can lead to data leakage, destruction of critical files, denial of service, or even full system compromise if key system files are deleted or manipulated. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges or user interaction required (PR:N/UI:N), and high impact on confidentiality, integrity, and availability (VC:H/VI:H/VA:H). The vulnerability is severe due to the combination of ease of exploitation and potential for significant damage. No patches or exploit code are currently publicly available, but the risk remains high due to the nature of the flaw and the unauthenticated access.

Potential Impact

For European organizations, especially those deploying SunFounder Pironman Dashboard in industrial control systems, IoT environments, or network management, this vulnerability poses a critical risk. Exploitation could lead to unauthorized disclosure of sensitive operational data, intellectual property, or personal data protected under GDPR. Deletion of critical files could disrupt business operations, cause downtime, or damage system integrity, potentially leading to safety hazards in industrial contexts. The unauthenticated nature of the vulnerability increases the attack surface, allowing remote attackers to exploit it without insider access. This could facilitate ransomware attacks, espionage, or sabotage. Organizations in sectors such as manufacturing, energy, and critical infrastructure in Europe could face operational, financial, and reputational damage if exploited.

Mitigation Recommendations

Since no official patches are currently available, European organizations should implement immediate compensating controls. These include restricting network access to the pm_dashboard API endpoints via firewalls or network segmentation to trusted IPs only. Implement web application firewalls (WAFs) with custom rules to detect and block path traversal patterns in API requests. Conduct thorough monitoring and logging of access to the dashboard and file system for suspicious activity. Disable or restrict the log file API endpoints if possible until a patch is released. Apply the principle of least privilege to the service account running the dashboard to minimize the impact of file deletion. Regularly back up critical files and system configurations to enable recovery in case of deletion or corruption. Stay alert for vendor updates or patches and apply them promptly once available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-01-28T21:47:35.120Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697e96fbac063202225694f0

Added to database: 1/31/2026, 11:57:47 PM

Last enriched: 2/1/2026, 12:12:06 AM

Last updated: 2/1/2026, 9:41:38 AM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats