CVE-2026-28769 PUBLISHED

LFI in /IDC_Logging/checkifdone.cgi, "file" parameter Allowing for File Existence Enumeration On IDC Satellite Receiver Web Management Interface Version 101

Assigner: Gridware
Reserved: 03.03.2026 Published: 04.03.2026 Updated: 04.03.2026

A path traversal vulnerability exists in the /IDC_Logging/checkifdone.cgi script in International Datacasting Corporation (IDC) SFX Series SuperFlex Satellite Receiver Web management portal version 101. An authenticated attacker can manipulate the file parameter to traverse directories and enumerate arbitrary files on the underlying filesystem. Due to the insecure perl file path handling function in use, a authenticated actor is able to preform directory traversal, with the backup endpoint confirming a file exists by indicating that a backup operation was successful or when using the path of a non existent file, the returned status is failed.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N
CVSS Score: 5.3

Product Status

Vendor International Datacasting Corporation (IDC)
Product SFX Series SuperFlex Satellite Receiver Web management interface
Versions Default: unknown
  • Version 101 is unaffected

Credits

  • Abdul Mhanni finder

References

Problem Types

  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE

Impacts

  • Information Disclosure / Arbitrary File Read