CVE-2026-36829
Description
An authentication bypass vulnerability exists in the embedded HTTP server of Panabit PAP-XM320 up to and including v7.7. The server validates session cookies using a filesystem existence check based on a user-controlled cookie value without proper sanitization, allowing directory traversal and bypass of authentication.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An authentication bypass in Panabit PAP-XM320 up to v7.7 allows unauthenticated remote attackers to gain admin access via directory traversal in cookie validation.
Vulnerability
The embedded HTTP server in Panabit PAP-XM320 up to and including v7.7 validates session cookies by checking for the existence of a file on the filesystem using the cookie value directly. No sanitization is applied, enabling directory traversal. An attacker can supply a cookie value such as ../../etc/passwd to bypass the existence check and authenticate as an administrative user.
Exploitation
An attacker with network access to the device's HTTP management interface can send a crafted HTTP request containing a malicious session cookie. The cookie value includes directory traversal sequences (e.g., ../) to point to an existing system file. The server's filesystem existence check succeeds, and the attacker is granted an authenticated session without valid credentials.
Impact
Successful exploitation grants the attacker administrative access to the web interface. This leads to full compromise of the device, including the ability to read sensitive data, modify configuration, and potentially pivot to internal networks. The CVSS v3 score is 9.8 (Critical).
Mitigation
As of the publication date (2026-05-19), no official patch or workaround has been released by Panabit. Users should monitor the vendor's website [1] for updates. The vulnerability is not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog at this time.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.