Vulnerability Description
An authentication bypass vulnerability exists in the embedded HTTP server of Panabit PAP-XM320 up to and including v7.7. The server validates session cookies using a filesystem existence check based on a user-controlled cookie value without proper sanitization, allowing directory traversal and bypass of authentication.
CVSS Score
CRITICAL
Related Weaknesses (CWE)
References
- https://secreu.notion.site/CVE-2026-36829-3652c0ab461580e19704e87b18865714
- https://www.panabit.com/
- https://secreu.notion.site/CVE-2026-36829-3652c0ab461580e19704e87b18865714
FAQ
What is CVE-2026-36829?
CVE-2026-36829 is a vulnerability with a CVSS score of 9.8 (CRITICAL). An authentication bypass vulnerability exists in the embedded HTTP server of Panabit PAP-XM320 up to and including v7.7. The server validates session cookies using a filesystem existence check based o...
How severe is CVE-2026-36829?
CVE-2026-36829 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-36829?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.