Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4619: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in NEC Platforms, Ltd. Aterm WX3600HP

0
Medium
VulnerabilityCVE-2026-4619cvecve-2026-4619cwe-22
Published: Fri Mar 27 2026 (03/27/2026, 11:46:54 UTC)
Source: CVE Database V5
Vendor/Project: NEC Platforms, Ltd.
Product: Aterm WX3600HP

Description

CVE-2026-4619 is a path traversal vulnerability affecting NEC Platforms, Ltd. 's Aterm WX3600HP router series before version 1. 5. 3. This flaw allows an attacker with high privileges to write arbitrary files over the network by bypassing pathname restrictions. Exploitation requires network access and high authentication privileges, with no user interaction needed. The vulnerability impacts confidentiality, integrity, and availability by enabling unauthorized file modification. Although no known exploits are currently in the wild, the risk remains significant for affected devices. The CVSS 4. 0 score rates this vulnerability as medium severity, reflecting the complexity of exploitation and required privileges.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 12:14:52 UTC

Technical Analysis

CVE-2026-4619 is a path traversal vulnerability classified under CWE-22, found in NEC Platforms, Ltd.'s Aterm WX3600HP router series prior to version 1.5.3. The vulnerability arises from improper limitation of pathname inputs, allowing an attacker to traverse directories and write arbitrary files on the device via network requests. This can lead to overwriting critical system files or configuration data, potentially enabling persistent compromise or denial of service. Exploitation requires the attacker to have high-level privileges (PR:H) and network access (AV:N), but does not require user interaction (UI:N). The vulnerability impacts confidentiality, integrity, and availability, with high impact on integrity and availability, and low impact on confidentiality. The CVSS 4.0 vector indicates high attack complexity (AC:H), no privileges required for attack initiation (AT:N), and no scope change (SC:N). No public exploits are known at this time, but the vulnerability's nature makes it a serious concern for affected organizations. The lack of available patches necessitates immediate mitigation efforts to reduce exposure. This vulnerability is particularly relevant for environments relying on NEC's Aterm WX3600HP routers, commonly deployed in enterprise and service provider networks.

Potential Impact

The path traversal vulnerability allows attackers with high privileges to overwrite arbitrary files on the affected router, which can lead to several severe consequences. These include unauthorized modification or deletion of system and configuration files, potentially resulting in device malfunction, denial of service, or persistent backdoor installation. The integrity of the device is directly compromised, and availability may be disrupted if critical files are corrupted. Confidentiality impact is lower but still possible if attackers modify files to capture or redirect sensitive data. Organizations relying on these routers for network infrastructure risk operational disruption and potential lateral movement by attackers within their networks. The medium CVSS score reflects the requirement for high privileges and attack complexity, but the potential damage to network infrastructure is significant. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially if attackers develop exploit code.

Mitigation Recommendations

1. Upgrade the Aterm WX3600HP firmware to version 1.5.3 or later once available to apply the official patch addressing the path traversal vulnerability. 2. Restrict network access to the router's management interfaces using network segmentation, firewall rules, and VPNs to limit exposure to trusted administrators only. 3. Enforce strong authentication mechanisms, including complex passwords and multi-factor authentication, to reduce the risk of unauthorized high-privilege access. 4. Monitor router logs and file integrity regularly to detect unusual file modifications or access patterns indicative of exploitation attempts. 5. Disable unnecessary services and interfaces on the router to minimize the attack surface. 6. Implement network intrusion detection systems (NIDS) with signatures or heuristics capable of identifying path traversal attempts. 7. If patching is delayed, consider temporary compensating controls such as access control lists (ACLs) and strict administrative access policies. 8. Educate network administrators about the vulnerability and encourage vigilance for suspicious activity related to router management.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
NEC
Date Reserved
2026-03-23T06:04:46.181Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c671313c064ed76fa3fd88

Added to database: 3/27/2026, 11:59:45 AM

Last enriched: 3/27/2026, 12:14:52 PM

Last updated: 3/27/2026, 1:10:09 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses