Description
The default TCL Camera application exposes a provider vulnerable to path traversal vulnerability. Malicious application can supply malicious URI path and delete arbitrary files from user’s external storage.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-33673 | The default TCL Camera application exposes a provider vulnerable to path traversal vulnerability. Malicious application can supply malicious URI path and delete arbitrary files from user’s external storage. |
References
History
Thu, 14 Nov 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 14 Nov 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The default TCL Camera application exposes a provider vulnerable to path traversal vulnerability. Malicious application can supply malicious URI path and delete arbitrary files from user’s external storage. | |
| Title | Arbitrary file removal via path traversal in TCL Camera | |
| Weaknesses | CWE-35 | |
| References |
| |
| Metrics |
cvssV4_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2024-11-14T15:59:14.006Z
Reserved: 2024-11-12T12:11:03.801Z
Link: CVE-2024-11136
Updated: 2024-11-14T15:59:09.250Z
Status : Deferred
Published: 2024-11-14T16:15:18.273
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-11136
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD