The tbm-client from Chunghwa Telecom has an Arbitrary File Delete vulnerability. The application sets up a simple local web server and provides APIs for communication with the target website. Due to the lack of CSRF protection in the APIs, unauthenticated remote attackers could use these APIs through phishing. Additionally, one of the APIs contains an Absolute Path Traversal vulnerability, allowing attackers to delete arbitrary files on the user's system.
Metrics
Affected Vendors & Products
References
History
Mon, 16 Dec 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 16 Dec 2024 06:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The tbm-client from Chunghwa Telecom has an Arbitrary File Delete vulnerability. The application sets up a simple local web server and provides APIs for communication with the target website. Due to the lack of CSRF protection in the APIs, unauthenticated remote attackers could use these APIs through phishing. Additionally, one of the APIs contains an Absolute Path Traversal vulnerability, allowing attackers to delete arbitrary files on the user's system. | |
Title | Chunghwa Telecom tbm-client - Arbitrary File Delete | |
Weaknesses | CWE-352 CWE-36 |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: twcert
Published: 2024-12-16T06:37:33.766Z
Updated: 2024-12-16T16:43:23.320Z
Reserved: 2024-12-16T01:39:24.186Z
Link: CVE-2024-12643

Updated: 2024-12-16T16:43:20.404Z

Status : Received
Published: 2024-12-16T07:15:06.217
Modified: 2024-12-16T07:15:06.217
Link: CVE-2024-12643

No data.