The default TCL Camera application exposes a provider vulnerable to path traversal vulnerability. Malicious application can supply malicious URI path and delete arbitrary files from user’s external storage.
History

Thu, 14 Nov 2024 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 14 Nov 2024 15:30:00 +0000

Type Values Removed Values Added
Description The default TCL Camera application exposes a provider vulnerable to path traversal vulnerability. Malicious application can supply malicious URI path and delete arbitrary files from user’s external storage.
Title Arbitrary file removal via path traversal in TCL Camera
Weaknesses CWE-35
References
Metrics cvssV4_0

{'score': 8.2, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-PL

Published: 2024-11-14T15:25:18.693Z

Updated: 2024-11-14T15:59:14.006Z

Reserved: 2024-11-12T12:11:03.801Z

Link: CVE-2024-11136

cve-icon Vulnrichment

Updated: 2024-11-14T15:59:09.250Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-11-14T16:15:18.273

Modified: 2024-11-15T13:58:08.913

Link: CVE-2024-11136

cve-icon Redhat

No data.