Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28769: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in International Datacasting Corporation (IDC) SFX Series SuperFlex Satellite Receiver Web management interface

0
Medium
VulnerabilityCVE-2026-28769cvecve-2026-28769cwe-22
Published: Wed Mar 04 2026 (03/04/2026, 07:02:13 UTC)
Source: CVE Database V5
Vendor/Project: International Datacasting Corporation (IDC)
Product: SFX Series SuperFlex Satellite Receiver Web management interface

Description

A path traversal vulnerability exists in the /IDC_Logging/checkifdone.cgi script in International Datacasting Corporation (IDC) SFX Series SuperFlex Satellite Receiver Web management portal version 101. An authenticated attacker can manipulate the `file` parameter to traverse directories and enumerate arbitrary files on the underlying filesystem. Due to the insecure perl file path handling function in use, a authenticated actor is able to preform directory traversal, with the backup endpoint confirming a file exists by indicating that a backup operation was successful or when using the path of a non existent file, the returned status is failed.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/11/2026, 19:53:53 UTC

Technical Analysis

CVE-2026-28769 is a path traversal vulnerability classified under CWE-22, found in the International Datacasting Corporation (IDC) SFX Series SuperFlex Satellite Receiver Web management interface, specifically in the /IDC_Logging/checkifdone.cgi script. The vulnerability allows an authenticated attacker to manipulate the 'file' parameter to traverse directories beyond the intended restricted directory. This is due to insecure handling of file paths in the Perl script, which fails to properly sanitize or restrict user input, enabling directory traversal attacks. By exploiting this flaw, an attacker can enumerate arbitrary files on the underlying filesystem. The backup endpoint behavior provides feedback on file existence: a successful backup operation indicates the file exists, while a failure indicates it does not. This side-channel allows attackers to confirm the presence of sensitive files, potentially leading to information disclosure. The vulnerability does not require user interaction beyond authentication, and the CVSS 4.0 base score is 5.3 (medium severity), reflecting network attack vector, low complexity, no privileges required beyond authentication, and limited confidentiality impact. No patches or known exploits have been reported at the time of publication. The vulnerability affects the integrity of the system by allowing unauthorized file enumeration and potentially confidentiality if sensitive files are disclosed. The scope is limited to authenticated users with access to the web management interface.

Potential Impact

The primary impact of CVE-2026-28769 is unauthorized information disclosure through file enumeration on the satellite receiver's underlying filesystem. Attackers with valid credentials can leverage this vulnerability to identify sensitive configuration files, logs, or credentials stored on the device, which could facilitate further attacks such as privilege escalation or lateral movement within the network. Given the device's role in satellite communications, exposure of sensitive files could compromise operational security, disrupt satellite broadcast services, or leak proprietary or classified information. The vulnerability does not directly allow remote code execution or denial of service but can be a stepping stone for more severe attacks. Organizations relying on IDC SFX Series receivers for critical communications, especially in defense, broadcasting, or emergency services, may face operational risks and data confidentiality breaches. The requirement for authentication limits exposure but insider threats or compromised credentials increase risk. The lack of user interaction requirement simplifies exploitation once authenticated access is obtained.

Mitigation Recommendations

To mitigate CVE-2026-28769, organizations should first check for and apply any official patches or firmware updates from International Datacasting Corporation addressing this vulnerability. In the absence of patches, implement strict access controls to the web management interface, limiting access only to trusted administrators and using strong authentication mechanisms such as multi-factor authentication. Network segmentation should isolate the satellite receiver management interface from general user networks to reduce exposure. Employ web application firewalls (WAFs) or intrusion detection systems (IDS) with custom rules to detect and block suspicious directory traversal attempts targeting the 'file' parameter in /IDC_Logging/checkifdone.cgi. Regularly audit and monitor logs for unusual file access patterns or repeated backup operation requests that may indicate exploitation attempts. Additionally, review and harden the Perl scripts or configuration files if custom modifications are possible, ensuring proper input validation and sanitization of file path parameters. Conduct security awareness training for administrators to recognize and report suspicious activity. Finally, maintain an inventory of affected devices and prioritize remediation based on criticality and exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Gridware
Date Reserved
2026-03-03T09:59:08.425Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a7dcb8d1a09e29cb1037d6

Added to database: 3/4/2026, 7:18:16 AM

Last enriched: 3/11/2026, 7:53:53 PM

Last updated: 4/17/2026, 4:41:47 PM

Views: 85

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses