Path traversal vulnerability in the AMR Printer Management 1.01 Beta web service, which allows remote attackers to read arbitrary files from the underlying Windows system by using specially crafted path traversal sequences in requests directed to the web management service. The service is accessible without authentication and runs with elevated privileges, amplifying the impact of the vulnerability. An attacker can exploit this condition to access sensitive and privileged files on the system using path traversal payloads. Successful exploitation of this vulnerability could lead to the unauthorized disclosure of internal system information, compromising the confidentiality of the affected environment.
Metrics
Affected Vendors & Products
References
History
Wed, 18 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 18 Feb 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Path traversal vulnerability in the AMR Printer Management 1.01 Beta web service, which allows remote attackers to read arbitrary files from the underlying Windows system by using specially crafted path traversal sequences in requests directed to the web management service. The service is accessible without authentication and runs with elevated privileges, amplifying the impact of the vulnerability. An attacker can exploit this condition to access sensitive and privileged files on the system using path traversal payloads. Successful exploitation of this vulnerability could lead to the unauthorized disclosure of internal system information, compromising the confidentiality of the affected environment. | |
| Title | Directory Traversal in AMR Printer Management by AMR | |
| First Time appeared |
Amr
Amr amr Printer Management Beta Web Service |
|
| Weaknesses | CWE-22 | |
| CPEs | cpe:2.3:a:amr:amr_printer_management_beta_web_service:1.01:*:*:*:*:*:*:* | |
| Vendors & Products |
Amr
Amr amr Printer Management Beta Web Service |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: INCIBE
Published: 2026-02-18T13:43:08.101Z
Updated: 2026-02-18T14:47:38.856Z
Reserved: 2026-02-13T12:10:06.897Z
Link: CVE-2026-2464
Updated: 2026-02-18T14:47:30.515Z
Status : Awaiting Analysis
Published: 2026-02-18T14:16:07.120
Modified: 2026-02-18T17:51:53.510
Link: CVE-2026-2464
No data.