Intrado 911 Emergency Gateway (EGW) 5.x, 6.x, and 7.x contain a path traversal vulnerability in the download_debuglog_file.php endpoint used for Debug Logs downloads. An unauthenticated attacker can manipulate the name parameter to read arbitrary files outside the intended directory
Metrics
Affected Vendors & Products
References
History
Mon, 04 May 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A path traversal condition in Intrado 911 Emergency Gateway could allow an attacker with existing network access the ability to access the EGW management interface without authentication. Successful exploitation of this vulnerability could allow a user to read, modify, or delete files. | Intrado 911 Emergency Gateway (EGW) 5.x, 6.x, and 7.x contain a path traversal vulnerability in the download_debuglog_file.php endpoint used for Debug Logs downloads. An unauthenticated attacker can manipulate the name parameter to read arbitrary files outside the intended directory |
Mon, 27 Apr 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Intrado
Intrado 911 Emergency Gateway |
|
| Vendors & Products |
Intrado
Intrado 911 Emergency Gateway |
Thu, 23 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 23 Apr 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A path traversal condition in Intrado 911 Emergency Gateway could allow an attacker with existing network access the ability to access the EGW management interface without authentication. Successful exploitation of this vulnerability could allow a user to read, modify, or delete files. | |
| Title | Path traversal: '.../...//' in Intrado 911 Emergency Gateway (EGW) | |
| Weaknesses | CWE-35 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: icscert
Published: 2026-04-23T18:14:09.028Z
Updated: 2026-05-04T21:15:57.832Z
Reserved: 2026-04-10T14:14:22.543Z
Link: CVE-2026-6074
Updated: 2026-04-23T18:50:15.839Z
Status : Awaiting Analysis
Published: 2026-04-23T19:17:30.410
Modified: 2026-05-04T22:16:19.280
Link: CVE-2026-6074
No data.
ReportizFlow