The topm-client from Chunghwa Telecom has an Arbitrary File Delete vulnerability. The application sets up a simple local web server and provides APIs for communication with the target website. Due to the lack of CSRF protection in the APIs, unauthenticated remote attackers could use these APIs through phishing. Additionally, one of the APIs contains an Absolute Path Traversal vulnerability, allowing attackers to delete arbitrary files on the user's system.
Metrics
Affected Vendors & Products
References
History
Mon, 16 Dec 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 16 Dec 2024 07:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The topm-client from Chunghwa Telecom has an Arbitrary File Delete vulnerability. The application sets up a simple local web server and provides APIs for communication with the target website. Due to the lack of CSRF protection in the APIs, unauthenticated remote attackers could use these APIs through phishing. Additionally, one of the APIs contains an Absolute Path Traversal vulnerability, allowing attackers to delete arbitrary files on the user's system. | |
Title | Chunghwa Telecom topm-client - Arbitrary File Delete | |
Weaknesses | CWE-352 CWE-36 |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: twcert
Published: 2024-12-16T06:54:03.176Z
Updated: 2024-12-16T16:33:50.477Z
Reserved: 2024-12-16T01:39:28.181Z
Link: CVE-2024-12646

Updated: 2024-12-16T16:33:43.919Z

Status : Received
Published: 2024-12-16T07:15:06.737
Modified: 2024-12-16T07:15:06.737
Link: CVE-2024-12646

No data.