source: https://www.securityfocus.com/bid/20067/info
The httpd daemon of BusyBox is prone to a directory-traversal vulnerability because it fails to properly sanitize user-supplied input.
An attacker can exploit this vulnerability to retrieve arbitrary files from the vulnerable system in the context of the affected application. Information obtained may aid in further attacks.
This issue affects version 1.01; other versions may also be vulnerable.
http://www.example.com//%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd