Impact
Anviz CX7 Firmware is vulnerable through an authenticated CSV upload feature. The flaw allows an attacker to supply file paths containing traversal characters, enabling the overwrite of any file referenced by the device, such as /etc/shadow. By modifying critical system files and combining this capability with changes to debug settings, an attacker can gain unauthorized SSH access and potentially control the device. This represents a form of remote code execution or privilege escalation for authenticated users.
Affected Systems
The affected product is Anviz CX7 Firmware. No specific version information is available, so all released firmware editions should be considered potentially vulnerable.
Risk and Exploitability
The CVSS score of 4.9 indicates a moderate level of severity. Because the EPSS score is not available, no current exploitation probability has been quantified, and the vulnerability is not listed in CISA’s KEV catalog. The attack vector requires authenticated access to the CSV upload endpoint, but once accessed it can overwrite arbitrary files, making it highly impactful if exploited. Organizations should treat this as a moderate risk pending a vendor fix.
OpenCVE Enrichment