Smart eVision’s file acquisition function has a path traversal vulnerability due to insufficient filtering for special characters in the URL parameter. An unauthenticated remote attacker can exploit this vulnerability to bypass authentication, access restricted paths to download and delete arbitrary system files to disrupt service.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-41579 | Smart eVision’s file acquisition function has a path traversal vulnerability due to insufficient filtering for special characters in the URL parameter. An unauthenticated remote attacker can exploit this vulnerability to bypass authentication, access restricted paths to download and delete arbitrary system files to disrupt service. |
Fixes
Solution
Contact tech support from Smart eVision Information Technology Inc.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://www.twcert.org.tw/tw/cp-132-6570-9c632-1.html |
|
History
Wed, 21 May 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2025-05-21T14:51:32.612Z
Reserved: 2022-08-30T00:00:00.000Z
Link: CVE-2022-39033
Updated: 2024-08-03T11:10:32.292Z
Status : Modified
Published: 2022-09-28T04:15:14.883
Modified: 2024-11-21T07:17:24.990
Link: CVE-2022-39033
No data.
OpenCVE Enrichment
No data.
EUVD