A vulnerability has been identified in BuzzyWall, which could be exploited by attackers to gain unauthorized access to arbitrary files on a vulnerable system. This issue is caused by an input validation error in the "download.php" script that does not validate the "id" parameter before being passed as an argument to a "readfile()" call, which could be exploited to disclose the contents of arbitrary files.
Vulnerable Products
Vulnerable Software: BuzzyWall version 1.3.1 and prior