CVE-2025-32819Files or Directories Accessible to External Parties in Sma100

Severity
8.8HIGHNVD
EPSS
0.9%
top 24.89%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 7
Latest updateOct 6

Description

A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges to bypass the path traversal checks and delete an arbitrary file potentially resulting in a reboot to factory default settings.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages7 packages

NVDsonicwall/sma_100_firmware< 10.2.1.15-81sv
CVEListV5sonicwall/sma10010.2.1.14-75sv and earlier versions
NVDsonicwall/sma_200_firmware< 10.2.1.15-81sv
NVDsonicwall/sma_210_firmware< 10.2.1.15-81sv
NVDsonicwall/sma_400_firmware< 10.2.1.15-81sv

🔴Vulnerability Details

3
GHSA
GHSA-xfvq-95g5-jfq9: A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges to bypass the path traversal checks and delete an arbitra2025-05-07
CVEList
CVE-2025-32819: A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges to bypass the path traversal checks and delete an arbitra2025-05-07
VulnCheck
SonicWall sma_100_firmware Files or Directories Accessible to External Parties2025

🔍Detection Rules

1
Suricata
ET WEB_SERVER SonicWall SMA Authenticated RAC_DOWNLOAD_TAR Arbitrary File Deletion (CVE-2025-32819)2025-10-06

🕵️Threat Intelligence

1
Bleepingcomputer
SonicWall urges admins to patch VPN flaw exploited in attacks2025-05-08
CVE-2025-32819 — Sonicwall Sma100 vulnerability | cvebase