An attacker can make use of this vulnerability to step out of the root directory and access other parts of the file system.
This might give the attacker the ability to view restricted files, which could provide the attacker with more information required to further compromise the system.
https://www.acunetix.com/websitesecurity/directory-traversal/
Severity: critical
Fingerprint: ac4d53c4832b2491c591c07d1c07f5a113ba96f16b1000ab24f74101676f2597
Found host file trough Directory traversal: # do not remove the following line, or various programs # that require network functionality will fail. 127.0.0.1 localhost 192.168.0.10 mpc8313erdb 192.168.0.1 gateway0 192.168.0.3 gateway1 192.168.0.4 gateway2 192.168.0.5 gateway3 192.168.0.6 gateway4