The topm-client from Chunghwa Telecom has an Arbitrary File Delete vulnerability. The application sets up a simple local web server and provides APIs for communication with the target website. Due to the lack of CSRF protection in the APIs, unauthenticated remote attackers could use these APIs through phishing. Additionally, one of the APIs contains an Absolute Path Traversal vulnerability, allowing attackers to delete arbitrary files on the user's system.
History

Mon, 16 Dec 2024 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Dec 2024 07:00:00 +0000

Type Values Removed Values Added
Description The topm-client from Chunghwa Telecom has an Arbitrary File Delete vulnerability. The application sets up a simple local web server and provides APIs for communication with the target website. Due to the lack of CSRF protection in the APIs, unauthenticated remote attackers could use these APIs through phishing. Additionally, one of the APIs contains an Absolute Path Traversal vulnerability, allowing attackers to delete arbitrary files on the user's system.
Title Chunghwa Telecom topm-client - Arbitrary File Delete
Weaknesses CWE-352
CWE-36
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: twcert

Published: 2024-12-16T06:54:03.176Z

Updated: 2024-12-16T16:33:50.477Z

Reserved: 2024-12-16T01:39:28.181Z

Link: CVE-2024-12646

cve-icon Vulnrichment

Updated: 2024-12-16T16:33:43.919Z

cve-icon NVD

Status : Received

Published: 2024-12-16T07:15:06.737

Modified: 2024-12-16T07:15:06.737

Link: CVE-2024-12646

cve-icon Redhat

No data.