SERVER-WEBAPP Seowonintech system_config.cgi local file include attempt
This event is generated when a file information disclosure exploit attempt against a Seowonintech device is detected.
Sensitive information disclosed from the affected device.
This rule looks for file traversal characters in a vulnerable HTTP parameter.
Ease of attack
Ensure your Seowonintech devices are patched and running on the latest stable firmware. If your Seowonintech devices are not patched and this rule alerts, immediately isolate and remediate the targeted device in accordance with your organization's incident response policy.
- Cisco Talos Intelligence Group