An attacker can make use of this vulnerability to step out of the root directory and access other parts of the file system.
This might give the attacker the ability to view restricted files, which could provide the attacker with more information required to further compromise the system.
https://www.acunetix.com/websitesecurity/directory-traversal/
Severity: critical
Fingerprint: ac4d53c4832b2491c591c07dcc7199b7a9c3e5ae30f527e630f527e630f527e6
Found host file trough Directory traversal: 127.0.0.1 localhost 10.0.0.1 ppp_0_hostname 176.82.46.165 wan_hostname