CVE-2026-1523 PUBLISHED

Path Traversal in Digitek from Grupo Azkoyen

Assigner: INCIBE
Reserved: 28.01.2026 Published: 05.02.2026 Updated: 05.02.2026

Path Traversal vulnerability in Digitek ADT1100 and Digitek DT950 from PRIMION DIGITEK, S.L.U (Azkoyen Group). This vulnerability allows an attacker to access arbitrary files in the server's file system, thet is, 'http://<host>/..%2F..% 2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd'. By manipulating the input to include URL encoded directory traversal sequences (e.g., %2F representing /), an attacker can bypass the input validation mechanisms ans retrieve sensitive files outside the intended directory, which could lead to information disclosure or further system compromise.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
CVSS Score: 8.7

Product Status

Vendor PRIMION DIGITEK
Product Digitek ADT1100
Versions Default: unaffected
  • Version all versions is affected
Vendor PRIMION DIGITEK
Product Digitek DT950
Versions Default: unaffected
  • Version all versions is affected

Solutions

The vulnerability has been fixed in the latest version of the affected products.

Credits

  • Óscar Atienza Vendrell finder

References

Problem Types

  • CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE