The default TCL Camera application exposes a provider vulnerable to path traversal vulnerability. Malicious application can supply malicious URI path and delete arbitrary files from user’s external storage.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-33673 | The default TCL Camera application exposes a provider vulnerable to path traversal vulnerability. Malicious application can supply malicious URI path and delete arbitrary files from user’s external storage. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 14 Nov 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 14 Nov 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The default TCL Camera application exposes a provider vulnerable to path traversal vulnerability. Malicious application can supply malicious URI path and delete arbitrary files from user’s external storage. | |
| Title | Arbitrary file removal via path traversal in TCL Camera | |
| Weaknesses | CWE-35 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2024-11-14T15:59:14.006Z
Reserved: 2024-11-12T12:11:03.801Z
Link: CVE-2024-11136
Updated: 2024-11-14T15:59:09.250Z
Status : Awaiting Analysis
Published: 2024-11-14T16:15:18.273
Modified: 2024-11-15T13:58:08.913
Link: CVE-2024-11136
No data.
OpenCVE Enrichment
No data.
EUVD