Cyber Posture

CVE-2026-34790

HighPublic PoC

Published: 02 April 2026

Published
02 April 2026
Modified
07 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
EPSS Score 0.0024 47.6th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Description

Endian Firewall version 3.3.25 and prior allow authenticated users to delete arbitrary files via directory traversal in the remove ARCHIVE parameter to /cgi-bin/backup.cgi. The remove ARCHIVE parameter value is used to construct a file path without sanitization of directory traversal…

more

sequences, which is then passed to an unlink() call.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the lack of sanitization on the remove ARCHIVE parameter by requiring input validation to block directory traversal sequences before file path construction and unlink() execution.

prevent

Mandates timely identification, reporting, and correction of the directory traversal flaw in backup.cgi to eliminate the vulnerability.

prevent

Limits damage from successful traversal by ensuring low-privilege authenticated users or the CGI process lacks permissions to delete arbitrary system files.

Security SummaryAI

CVE-2026-34790 is a directory traversal vulnerability (CWE-22) affecting Endian Firewall versions 3.3.25 and prior. The flaw exists in the `/cgi-bin/backup.cgi` script, where the `remove ARCHIVE` parameter is used to construct a file path without sanitizing directory traversal sequences (`../`). This unsanitized path is passed directly to an `unlink()` call, enabling authenticated users to delete arbitrary files on the system. The vulnerability has a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L), indicating high integrity impact with low availability impact.

An attacker with low-privilege authenticated access (PR:L) can exploit this vulnerability over the network (AV:N) with low complexity and no user interaction required. By crafting a request to `/cgi-bin/backup.cgi` with a malicious `remove ARCHIVE` parameter containing directory traversal payloads, the attacker can target and delete sensitive files, potentially disrupting firewall operations, configurations, or logs. Successful exploitation leads to unauthorized file deletion, compromising system integrity and partial availability without affecting confidentiality.

Advisories from Endian and Vulncheck detail the issue and recommend mitigation. Endian's community support section (https://help.endian.com/hc/en-us/sections/360004371358-Community) provides relevant guidance, while Vulncheck's advisory (https://www.vulncheck.com/advisories/endian-firewall-cgi-bin-backup-cgi-remove-archive-directory-traversal) offers technical analysis on the traversal vulnerability in the backup CGI endpoint. Security practitioners should consult these for patch availability and workarounds in affected Endian Firewall deployments.

Details

CWE(s)

Affected Products

endian
firewall community
≤ 3.3.25

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1070.004 File Deletion Stealth
Adversaries may delete files left behind by the actions of their intrusion activity.
Why these techniques?

Directory traversal in public-facing CGI script (T1190) enables arbitrary file deletion via unlink() (T1070.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References