This script is Copyright (C) 2015 Tenable Network Security, Inc.
The remote device is affected by a directory traversal vulnerability.
The remote GoAhead embedded web server is affected by a directory
traversal vulnerability due to a flaw in the websNormalizeUriPath()
function. A remote, unauthenticated attacker can exploit this flaw to
obtain arbitrary files on the affected host.
The flaw that allows the directory traversal may also be used to
perform a heap-based buffer overflow, potentially allowing code
execution or a denial of service condition.
See also :
Contact the vendor of the device running the GoAhead embedded web
server for a fixed version.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.5
Public Exploit Available : false