An improper access control vulnerability in SMA100 allows a remote unauthenticated attacker to bypass the path traversal checks and delete an arbitrary file potentially resulting in a reboot to factory default settings.
| Software | From | Fixed in |
|---|---|---|
| sonicwall / sma_200_firmware | - | 9.0.0.10-28sv.x |
| sonicwall / sma_200_firmware | 10.2.0.0 | 10.2.0.7-34sv.x |
| sonicwall / sma_200_firmware | 10.2.1.0 | 10.2.1.0-17sv.x |
| sonicwall / sma_210_firmware | - | 9.0.0.10-28sv.x |
| sonicwall / sma_210_firmware | 10.2.0.0 | 10.2.0.7-34sv.x |
| sonicwall / sma_210_firmware | 10.2.1.0 | 10.2.1.0-17sv.x |
| sonicwall / sma_400_firmware | - | 9.0.0.10-28sv.x |
| sonicwall / sma_400_firmware | 10.2.0.0 | 10.2.0.7-34sv.x |
| sonicwall / sma_400_firmware | 10.2.1.0 | 10.2.1.0-17sv.x |
| sonicwall / sma_410_firmware | - | 9.0.0.10-28sv.x |
| sonicwall / sma_410_firmware | 10.2.0.0 | 10.2.0.7-34sv.x |
| sonicwall / sma_410_firmware | 10.2.1.0 | 10.2.1.0-17sv.x |
| sonicwall / sma_500v | 10.2.0.0 | 10.2.0.7-34sv.x |
| sonicwall / sma_500v | 10.2.1.0 | 10.2.1.0-17sv.x |
| sonicwall / sma_500v | - | 9.0.0.10-28sv.x |