CVE-2025-32819 — Files or Directories Accessible to External Parties in Sma100
Severity
8.8HIGHNVD
EPSS
0.9%
top 24.89%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 7
Latest updateOct 6
Description
A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges to bypass the path traversal checks and delete an arbitrary file potentially resulting in a reboot to factory default settings.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9
Affected Packages7 packages
🔴Vulnerability Details
3GHSA▶
GHSA-xfvq-95g5-jfq9: A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges to bypass the path traversal checks and delete an arbitra↗2025-05-07
CVEList▶
CVE-2025-32819: A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges to bypass the path traversal checks and delete an arbitra↗2025-05-07
🔍Detection Rules
1Suricata▶
ET WEB_SERVER SonicWall SMA Authenticated RAC_DOWNLOAD_TAR Arbitrary File Deletion (CVE-2025-32819)↗2025-10-06