CVE-2024-41887
Arbitrary File Overwrite
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Team ENVY, a Security Research TEAM has found a flaw that allows for a remote code execution on the NVR. An attacker can create an NVR log file in a directory one level higher on the system, which can be used to corrupt files in the directory. The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds.
Team ENVY, un equipo de investigación de seguridad, ha encontrado una falla que permite la ejecución remota de código en el NVR. Un atacante puede crear un archivo de registro de NVR en un directorio de un nivel superior en el sistema, que puede usarse para dañar archivos en el directorio. El fabricante ha publicado un parche de firmware para la falla; consulte el informe del fabricante para obtener detalles y workarounds.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2024-07-23 CVE Reserved
- 2024-12-24 CVE Published
- 2024-12-24 CVE Updated
- 2024-12-25 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
- CAPEC-139: Relative Path Traversal
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Hanwha Vision Co., Ltd. Search vendor "Hanwha Vision Co., Ltd." | XRN-420S Search vendor "Hanwha Vision Co., Ltd." for product "XRN-420S" | 5.01.62 Search vendor "Hanwha Vision Co., Ltd." for product "XRN-420S" and version "5.01.62" | en |
Affected
|