Description
The default TCL Camera application exposes a provider vulnerable to path traversal vulnerability. Malicious application can supply malicious URI path and delete arbitrary files from user’s external storage.
Published: 2024-11-14
Score: 8.2 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-33673 The default TCL Camera application exposes a provider vulnerable to path traversal vulnerability. Malicious application can supply malicious URI path and delete arbitrary files from user’s external storage.
History

Thu, 14 Nov 2024 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 14 Nov 2024 15:30:00 +0000

Type Values Removed Values Added
Description The default TCL Camera application exposes a provider vulnerable to path traversal vulnerability. Malicious application can supply malicious URI path and delete arbitrary files from user’s external storage.
Title Arbitrary file removal via path traversal in TCL Camera
Weaknesses CWE-35
References
Metrics cvssV4_0

{'score': 8.2, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-PL

Published:

Updated: 2024-11-14T15:59:14.006Z

Reserved: 2024-11-12T12:11:03.801Z

Link: CVE-2024-11136

cve-icon Vulnrichment

Updated: 2024-11-14T15:59:09.250Z

cve-icon NVD

Status : Deferred

Published: 2024-11-14T16:15:18.273

Modified: 2026-04-15T00:35:42.020

Link: CVE-2024-11136

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses