Intrado 911 Emergency Gateway (EGW) 5.x, 6.x, and 7.x contain a path traversal vulnerability in the download_debuglog_file.php endpoint used for Debug Logs downloads. An unauthenticated attacker can manipulate the name parameter to read arbitrary files outside the intended directory
History

Mon, 04 May 2026 21:30:00 +0000

Type Values Removed Values Added
Description A path traversal condition in Intrado 911 Emergency Gateway could allow an attacker with existing network access the ability to access the EGW management interface without authentication. Successful exploitation of this vulnerability could allow a user to read, modify, or delete files. Intrado 911 Emergency Gateway (EGW) 5.x, 6.x, and 7.x contain a path traversal vulnerability in the download_debuglog_file.php endpoint used for Debug Logs downloads. An unauthenticated attacker can manipulate the name parameter to read arbitrary files outside the intended directory

Mon, 27 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
First Time appeared Intrado
Intrado 911 Emergency Gateway
Vendors & Products Intrado
Intrado 911 Emergency Gateway

Thu, 23 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
Description A path traversal condition in Intrado 911 Emergency Gateway could allow an attacker with existing network access the ability to access the EGW management interface without authentication. Successful exploitation of this vulnerability could allow a user to read, modify, or delete files.
Title Path traversal: '.../...//' in Intrado 911 Emergency Gateway (EGW)
Weaknesses CWE-35
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published: 2026-04-23T18:14:09.028Z

Updated: 2026-05-04T21:15:57.832Z

Reserved: 2026-04-10T14:14:22.543Z

Link: CVE-2026-6074

cve-icon Vulnrichment

Updated: 2026-04-23T18:50:15.839Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-23T19:17:30.410

Modified: 2026-05-04T22:16:19.280

Link: CVE-2026-6074

cve-icon Redhat

No data.