Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
The vulnerability has been fixed by the TESI team in version 4.4.2446.2.
Workaround
No workaround given by the vendor.
Thu, 30 Oct 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:tesigandia:gandia_integra_total:4.4.2236.1:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Fri, 24 Oct 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tesigandia
Tesigandia gandia Integra Total |
|
| Vendors & Products |
Tesigandia
Tesigandia gandia Integra Total |
Thu, 23 Oct 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 23 Oct 2025 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Path Traversal vulnerability in version 4.4.2236.1 of TESI Gandia Integra Total. This issue allows an authenticated attacker to download a ZIP file containing files from the server, including those located in parent directories (e.g., ..\..\..), by exploiting the “direstudio” parameter in “/encuestas/integraweb[_v4]/integra/html/view/comprimir.php”. | |
| Title | Path Traversal in Gandia Integra Total by TESI | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2025-10-23T14:40:49.039Z
Reserved: 2025-04-16T09:09:34.458Z
Link: CVE-2025-41073
Updated: 2025-10-23T14:40:29.868Z
Status : Analyzed
Published: 2025-10-23T11:15:31.653
Modified: 2025-10-30T16:50:50.917
Link: CVE-2025-41073
No data.
OpenCVE Enrichment
Updated: 2025-10-24T10:16:59Z