Unrated severityNVD Advisory· Published Apr 27, 2014· Updated May 6, 2026
CVE-2011-3602
CVE-2011-3602
Description
Directory traversal vulnerability in device-linux.c in the router advertisement daemon (radvd) before 1.8.2 allows local users to overwrite arbitrary files, and remote attackers to overwrite certain files, via a .. (dot dot) in an interface name. NOTE: this can be leveraged with a symlink to overwrite arbitrary files.
Affected products
1- cpe:2.3:a:litech:router_advertisement_daemon:*:*:*:*:*:*:*:*Range: <=1.8.1
Patches
192e22ca23e52set_interface_var() doesn't check interface name and blindly does
1 file changed · +4 −0
device-linux.c+4 −0 modified@@ -243,6 +243,10 @@ set_interface_var(const char *iface, if (snprintf(spath, sizeof(spath), var, iface) >= sizeof(spath)) return -1; + /* No path traversal */ + if (strstr(name, "..") || strchr(name, '/')) + return -1; + if (access(spath, F_OK) != 0) return -1;
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5News mentions
0No linked articles in our index yet.