CVE-2022-39033
Published on: Not Yet Published
Last Modified on: 09/28/2022 11:44:00 PM UTC
Certain versions of Smart Evision from Lcnet contain the following vulnerability:
Smart eVision’s file acquisition function has a path traversal vulnerability due to insufficient filtering for special characters in the URL parameter. An unauthenticated remote attacker can exploit this vulnerability to bypass authentication, access restricted paths to download and delete arbitrary system files to disrupt service.
- CVE-2022-39033 has been assigned by
[email protected] to track the vulnerability - currently rated as CRITICAL severity.
- Affected Vendor/Software:
Smart eVision Information Technology Inc. - Smart eVision version = 2022.02.21
CVSS3 Score: 9.8 - CRITICAL
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | NONE | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | HIGH | HIGH |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
TWCERT/CC台灣電腦網路危機處理暨協調中心|企業資安通報協處|資安情資分享|漏洞通報|資安聯盟|資安電子報-聯銓資訊科技 Smart eVision - Path Traversal -1 | www.twcert.org.tw text/html |
![]() |
There are currently no QIDs associated with this CVE
Exploit/POC from Github
This repository contains a collection of data files on known Common Vulnerabilities and Exposures (CVEs). Each file i…
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Lcnet | Smart Evision | 2022.02.21 | All | All | All |
- cpe:2.3:a:lcnet:smart_evision:2022.02.21:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2022-39033 : Smart eVision’s file acquisition function has a path traversal vulnerability due to insufficient f… twitter.com/i/web/status/1… | 2022-09-28 03:33:43 |
![]() |
Potentially Critical CVE Detected! CVE-2022-39033 Smart eVision’s file acquisition function has a path traver… twitter.com/i/web/status/1… | 2022-09-28 04:55:57 |
![]() |
CVE-2022-39033 | 2022-09-28 04:38:53 |