### [CVE-2019-3976](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3976) ![](https://img.shields.io/static/v1?label=Product&message=MikroTik%20RouterOS&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-23%20Relative%20path%20traversal.&color=brighgreen) ### Description RouterOS 6.45.6 Stable, RouterOS 6.44.5 Long-term, and below are vulnerable to an arbitrary directory creation vulnerability via the upgrade package's name field. If an authenticated user installs a malicious package then a directory could be created and the developer shell could be enabled. ### POC #### Reference - https://www.tenable.com/security/research/tra-2019-46 - https://www.tenable.com/security/research/tra-2019-46 #### Github No PoCs found on GitHub currently.