Description
Smart eVision’s file acquisition function has a path traversal vulnerability due to insufficient filtering for special characters in the URL parameter. An unauthenticated remote attacker can exploit this vulnerability to bypass authentication, access restricted paths to download and delete arbitrary system files to disrupt service.
No analysis available yet.
Remediation
Vendor Solution
Contact tech support from Smart eVision Information Technology Inc.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-41579 | Smart eVision’s file acquisition function has a path traversal vulnerability due to insufficient filtering for special characters in the URL parameter. An unauthenticated remote attacker can exploit this vulnerability to bypass authentication, access restricted paths to download and delete arbitrary system files to disrupt service. |
References
| Link | Providers |
|---|---|
| https://www.twcert.org.tw/tw/cp-132-6570-9c632-1.html |
|
History
Wed, 21 May 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2025-05-21T14:51:32.612Z
Reserved: 2022-08-30T00:00:00.000Z
Link: CVE-2022-39033
Updated: 2024-08-03T11:10:32.292Z
Status : Modified
Published: 2022-09-28T04:15:14.883
Modified: 2024-11-21T07:17:24.990
Link: CVE-2022-39033
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD