Impact
An attacker can overwrite critical internal files by using the file import feature, which allows the application to write arbitrary data to protected locations. This vulnerability enables code execution if the attacker supplies a malicious file or permits disclosure of sensitive data. The weakness stems from inadequate validation of file paths and permissions during the import process.
Affected Systems
The flaw is found in the PDF Reader App component of TA/UTAX Mobile Print version 3.7.2.251001. No other vendors or products are listed; the affected software runs on mobile platforms, likely Android or iOS.
Risk and Exploitability
The CVSS score is not provided, but the potential for arbitrary code execution indicates a high severity level. EPSS data is unavailable and the vulnerability is not listed in CISA’s KEV catalog. The likely attack vector involves delivering a crafted file (e.g., via email or download) that the user opens, enabling the attacker to trigger the file overwrite. No official patch or workaround is indicated in the current data.
OpenCVE Enrichment