{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T07:23:12.034","vulnerabilities":[{"cve":{"id":"CVE-2021-37130","sourceIdentifier":"psirt@huawei.com","published":"2021-10-27T01:15:07.810","lastModified":"2024-11-21T06:14:42.253","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"There is a path traversal vulnerability in Huawei FusionCube 6.0.2.The vulnerability is due to that the software uses external input to construct a pathname that is intended to identify a directory that is located underneath a restricted parent directory, but the software does not properly validate the pathname. Successful exploit could allow the attacker to access a location that is outside of the restricted directory by a crafted filename."},{"lang":"es","value":"Se presenta una vulnerabilidad de salto de ruta en FusionCube versión 6.0.2 de Huawei. La vulnerabilidad es debido a que el software usa una entrada externa para construir un nombre de ruta que pretende identificar un directorio que se encuentra debajo de un directorio principal restringido, pero el software no comprueba apropiadamente el nombre de ruta. Una explotación con éxito podría permitir al atacante acceder a una ubicación que está fuera del directorio restringido mediante un nombre de archivo diseñado"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:huawei:fusioncube_firmware:6.0.2:*:*:*:*:*:*:*","matchCriteriaId":"A7AD0E47-B3D2-4709-8E4E-80953C367024"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:huawei:fusioncube:-:*:*:*:*:*:*:*","matchCriteriaId":"24308A28-1E42-4C3F-9DC0-D5EC98BF2867"}]}]}],"references":[{"url":"https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-pathtraversal-en","source":"psirt@huawei.com","tags":["Patch","Vendor Advisory"]},{"url":"https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20211020-01-pathtraversal-en","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}