Smart eVision’s file acquisition function has a path traversal vulnerability due to insufficient filtering for special characters in the URL parameter. An unauthenticated remote attacker can exploit this vulnerability to bypass authentication, access restricted paths to download and delete arbitrary system files to disrupt service.
Metrics
Affected Vendors & Products
Fixes
Solution
Contact tech support from Smart eVision Information Technology Inc.
Workaround
No workaround given by the vendor.
References
Link | Providers |
---|---|
https://www.twcert.org.tw/tw/cp-132-6570-9c632-1.html |
![]() ![]() |
History
Wed, 21 May 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2025-05-21T14:51:32.612Z
Reserved: 2022-08-30T00:00:00.000Z
Link: CVE-2022-39033

Updated: 2024-08-03T11:10:32.292Z

Status : Modified
Published: 2022-09-28T04:15:14.883
Modified: 2024-11-21T07:17:24.990
Link: CVE-2022-39033

No data.

No data.