漏洞标题
利用红色acted动作或红色acted. sh脚本,可使用目录遍历随意删除文件和目录
漏洞描述信息
N/A
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
漏洞类别
对路径名的限制不恰当(路径遍历)
漏洞标题
Using the <redacted> action or <redacted>.sh script, arbitrary files and directories can be deleted using directory traversal.
漏洞描述信息
Patch traversal, External Control of File Name or Path vulnerability in Iocharger Home allows deletion of arbitrary files
This issue affects Iocharger firmware for AC model before firmware version 25010801.
Likelihood: High, but requires authentication
Impact: Critical – The vulnerability can be used to delete any file on the charging station, severely impacting the integrity of the charging station. Furthermore, the vulnerability could be used to delete binaries required for the functioning of the charging station, severely impacting the availability of the charging station.
CVSS clarification: Any network interface serving the web ui is vulnerable (AV:N) and there are not additional security measures to circumvent (AC:L), nor does the attack require and existing preconditions (AT:N). The attack is authenticated, but the level of authentication does not matter (PR:L), nor is any user interaction required (UI:N). The attack leads compromised of the integrity and availability of the device (VVC:N/VI:H/VA:H), with no effect on subsequent systems (SC:N/SI:N/SA:N). We do not forsee a safety impact (S:N). This attack can be automated (AU:Y).
CVSS信息
N/A
漏洞类别
路径遍历:’dir/../../filename’
漏洞标题
iocharger 安全漏洞
漏洞描述信息
iocharger是中国银河樟坛(iocharger)公司的一个电动汽车充电和智能能源管理解决方案。 Iocharger存在安全漏洞。攻击者利用该漏洞可以删除任意文件。
CVSS信息
N/A
漏洞类别
其他