An attacker can make use of this vulnerability to step out of the root directory and access other parts of the file system.
This might give the attacker the ability to view restricted files, which could provide the attacker with more information required to further compromise the system.
https://www.acunetix.com/websitesecurity/directory-traversal/
Severity: critical
Fingerprint: ac4d53c4832b2491c591c07dcc7199b7152f3767dc9d6b13dc9d6b13dc9d6b13
Found host file trough Directory traversal: 127.0.0.1 localhost 10.64.64.64 ppp_0_hostname 77.52.247.97 wan_hostname
An attacker can make use of this vulnerability to step out of the root directory and access other parts of the file system.
This might give the attacker the ability to view restricted files, which could provide the attacker with more information required to further compromise the system.
https://www.acunetix.com/websitesecurity/directory-traversal/
Severity: critical
Fingerprint: ac4d53c4832b2491c591c07dcc7199b7152f3767dc9d6b13dc9d6b13dc9d6b13
Found host file trough Directory traversal: 127.0.0.1 localhost 10.64.64.64 ppp_0_hostname 77.52.247.97 wan_hostname
Severity: critical
Fingerprint: ac4d53c4832b2491752255c435b0f8ec7b5f46009bef50ae9bef50ae9bef50ae
Found host file trough Apache traversal: 127.0.0.1 localhost 10.64.64.64 ppp_0_hostname 77.52.247.97 wan_hostname