Step 1: Crafting the Payload: The attacker constructs a malicious HTTP request containing a directory traversal payload. This payload typically includes the sequence ../ repeated to navigate up the directory tree, followed by the target file path (e.g., /etc/passwd).
Step 2: Sending the Request: The attacker sends the crafted HTTP request to the vulnerable HOT HOTBOX router.
Step 3: Request Processing: The router's web server receives the request and attempts to process the URI. Due to the vulnerability, the server fails to properly sanitize the input.
Step 4: File Access: The server, using the unsanitized path, attempts to open and serve the requested file (e.g., /etc/passwd).
Step 5: Information Disclosure: The router returns the contents of the requested file (e.g., /etc/passwd) in the HTTP response, providing the attacker with sensitive system information.