Endian Firewall Arbitrary File Deletion via Path Traversal (CVE-2026-34790)
Endian Firewall versions 3.3.25 and prior allow authenticated users to delete arbitrary files due to a path traversal vulnerability in the `remove ARCHIVE` parameter of the `/cgi-bin/backup.cgi` script, leading to unauthorized file system modification.
Endian Firewall, a security-focused Linux distribution designed for gateway security, is vulnerable to a path traversal attack. Specifically, versions 3.3.25 and earlier are affected by CVE-2026-34790. An authenticated user, with low-level privileges, can exploit this vulnerability to delete arbitrary files on the system. The flaw resides in the /cgi-bin/backup.cgi script where the remove ARCHIVE parameter is not properly sanitized. This allows an attacker to inject directory traversal sequences (e.g., ../) into the file path, bypassing intended restrictions. This can lead to deletion of sensitive files, potentially disrupting system operations or facilitating further malicious activities. The vulnerability was reported in April 2026.
Attack Chain
- An attacker authenticates to the Endian Firewall web interface.
- The attacker crafts a malicious HTTP request targeting
/cgi-bin/backup.cgi. - The request includes the
remove ARCHIVEparameter with a payload containing directory traversal sequences (e.g.,../../../../etc/shadow). - The
/cgi-bin/backup.cgiscript receives the request and constructs a file path using the unsanitizedremove ARCHIVEparameter. - The script calls the
unlink()function with the attacker-controlled file path. - The
unlink()function deletes the file specified by the manipulated path. - The attacker repeats this process to delete other critical system files.
- This can lead to a denial-of-service condition, data loss, or the potential for further system compromise.
Impact
Successful exploitation of this vulnerability allows an attacker to delete arbitrary files on the Endian Firewall system. This can result in a denial-of-service (DoS) condition if critical system files are removed. An attacker may target configuration files, logs, or even binaries, leading to system instability or the disabling of security features. The number of potential victims is dependent on the number of Endian Firewall deployments running vulnerable versions (3.3.25 and prior). Given that Endian Firewall is often used in small to medium-sized businesses, the impact could range from disruption of network services to potential data breaches, depending on the specific files targeted.
Recommendation
- Apply available patches or upgrade to a version of Endian Firewall that addresses CVE-2026-34790 to remediate the vulnerability.
- Monitor web server logs for requests to
/cgi-bin/backup.cgicontaining directory traversal sequences (e.g.,../,..\\) in theremove ARCHIVEparameter using the provided Sigma rule “Detect Endian Firewall Path Traversal Attempt”. - Implement input validation and sanitization on all user-supplied input, especially within CGI scripts like
/cgi-bin/backup.cgi, to prevent path traversal attacks. - Restrict access to the Endian Firewall web interface to trusted networks or users and enforce strong authentication measures.
- Regularly back up the Endian Firewall configuration and critical system files to mitigate the impact of potential data loss due to successful exploitation.
Detection coverage 2
Detect Endian Firewall Path Traversal Attempt
highDetects potential path traversal attempts in the remove ARCHIVE parameter of /cgi-bin/backup.cgi on Endian Firewall.
Endian Firewall Unlink Call with Traversal
highDetects system unlink calls when attacker attempts a path traversal attack.
Detection queries are kept inside the platform. Get full rules →
Indicators of compromise
1
| Type | Value |
|---|---|
| [email protected] |