Directory Traversal in Safescan Timemoto and TA-8000 series version 1.0 allows unauthenticated remote attackers to execute code via the administrative API.
References
Link | Resource |
---|---|
https://github.com/ProCheckUp/SafeScan | Exploit Third Party Advisory |
https://procheckup.com/blogs/posts/2020/february/remote-code-execution-on-biometric-iot-devices/ | Exploit Third Party Advisory |
https://safescan.com/ | Product |
https://support.timemoto.com/en/s/safescan-time-clock-systems/a/firmware-update-7-dot-03-dot-100-ta8000-14 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
History
No history.
Information
Published : 2020-03-13 17:15
Updated : 2024-02-28 17:47
NVD link : CVE-2019-12182
Mitre link : CVE-2019-12182
CVE.ORG link : CVE-2019-12182
JSON object : View
Products Affected
safescan
- ta-8025
- ta-8015_firmware
- ta-8020
- ta-8030_firmware
- ta-8035_firmware
- tm-616
- ta-8035
- tm-616_firmware
- ta-8015
- ta-8025_firmware
- ta-8030
- ta-8020_firmware
- ta-8010_firmware
- ta-8010
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')