Rule Category

SERVER-WEBAPP -- Snort has detected traffic exploiting vulnerabilities in web based applications on servers.

Alert Message

SERVER-WEBAPP Seowonintech system_config.cgi local file include attempt

Rule Explanation

This event is generated when a file information disclosure exploit attempt against a Seowonintech device is detected. Impact: Sensitive information disclosed from the affected device. Details: This rule looks for file traversal characters in a vulnerable HTTP parameter. Ease of Attack: Simple

What To Look For

Known Usage

No public information

False Positives

No known false positives


Cisco Talos Intelligence Group

MITRE ATT&CK Framework



For reference, see the MITRE ATT&CK vulnerability types here:

Additional Links

CVE Additional Information