- Description
- The topm-client from Chunghwa Telecom has an Arbitrary File Read vulnerability. The application sets up a simple local web server and provides APIs for communication with the target website. Due to the lack of CSRF protection for the APIs, unauthenticated remote attackers could use these APIs through phishing. Additionally, one of the APIs contains a Relative Path Traversal vulnerability, allowing attackers to read arbitrary files on the user's system.
- Source
- twcert@cert.org.tw
- NVD status
- Received
CVSS 3.1
- Type
- Primary
- Base score
- 6.5
- Impact score
- 3.6
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
- twcert@cert.org.tw
- CWE-23
- Hype score
- Not currently trending
CVE-2024-12645 Arbitrary File Read via CSRF in Chunghwa Telecom’s Topm-Client The topm-client from Chunghwa Telecom has a problem where it can read any file. It sets up a local web server and uses APIs to talk wi... https://t.co/hMX23OP8yG
@VulmonFeeds
16 Dec 2024
38 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-12645 The topm-client from Chunghwa Telecom has an Arbitrary File Read vulnerability. The application sets up a simple local web server and provides APIs for communication … https://t.co/oqPQE61JvF
@CVEnew
16 Dec 2024
554 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes