CVE-2026-34790
Published: 02 April 2026
Description
Endian Firewall version 3.3.25 and prior allow authenticated users to delete arbitrary files via directory traversal in the remove ARCHIVE parameter to /cgi-bin/backup.cgi. The remove ARCHIVE parameter value is used to construct a file path without sanitization of directory traversal…
more
sequences, which is then passed to an unlink() call.
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the lack of sanitization on the remove ARCHIVE parameter by requiring input validation to block directory traversal sequences before file path construction and unlink() execution.
Mandates timely identification, reporting, and correction of the directory traversal flaw in backup.cgi to eliminate the vulnerability.
Limits damage from successful traversal by ensuring low-privilege authenticated users or the CGI process lacks permissions to delete arbitrary system files.
Security SummaryAI
CVE-2026-34790 is a directory traversal vulnerability (CWE-22) affecting Endian Firewall versions 3.3.25 and prior. The flaw exists in the `/cgi-bin/backup.cgi` script, where the `remove ARCHIVE` parameter is used to construct a file path without sanitizing directory traversal sequences (`../`). This unsanitized path is passed directly to an `unlink()` call, enabling authenticated users to delete arbitrary files on the system. The vulnerability has a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L), indicating high integrity impact with low availability impact.
An attacker with low-privilege authenticated access (PR:L) can exploit this vulnerability over the network (AV:N) with low complexity and no user interaction required. By crafting a request to `/cgi-bin/backup.cgi` with a malicious `remove ARCHIVE` parameter containing directory traversal payloads, the attacker can target and delete sensitive files, potentially disrupting firewall operations, configurations, or logs. Successful exploitation leads to unauthorized file deletion, compromising system integrity and partial availability without affecting confidentiality.
Advisories from Endian and Vulncheck detail the issue and recommend mitigation. Endian's community support section (https://help.endian.com/hc/en-us/sections/360004371358-Community) provides relevant guidance, while Vulncheck's advisory (https://www.vulncheck.com/advisories/endian-firewall-cgi-bin-backup-cgi-remove-archive-directory-traversal) offers technical analysis on the traversal vulnerability in the backup CGI endpoint. Security practitioners should consult these for patch availability and workarounds in affected Endian Firewall deployments.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Directory traversal in public-facing CGI script (T1190) enables arbitrary file deletion via unlink() (T1070.004).