CVE-2022-24562

In IOBit IOTransfer 4.3.1.1561, an unauthenticated attacker can send GET and POST requests to Airserv and gain arbitrary read/write access to the entire file-system (with admin privileges) on the victim's endpoint, which can result in data theft and remote code execution.
Configurations

Configuration 1 (hide)

cpe:2.3:a:iobit:iotransfer:4.3.1.1561:*:*:*:*:*:*:*

History

21 Nov 2024, 06:50

Type Values Removed Values Added
References () http://iobit.com - Product, Vendor Advisory () http://iobit.com - Product, Vendor Advisory
References () http://iotransfer.com - Broken Link () http://iotransfer.com - Broken Link
References () http://packetstormsecurity.com/files/167775/IOTransfer-4.0-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/167775/IOTransfer-4.0-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () https://medium.com/%40tomerp_77017/exploiting-iotransfer-insecure-api-cve-2022-24562-a2c4a3f9149d - () https://medium.com/%40tomerp_77017/exploiting-iotransfer-insecure-api-cve-2022-24562-a2c4a3f9149d -

07 Nov 2023, 03:44

Type Values Removed Values Added
References
  • {'url': 'https://medium.com/@tomerp_77017/exploiting-iotransfer-insecure-api-cve-2022-24562-a2c4a3f9149d', 'name': 'https://medium.com/@tomerp_77017/exploiting-iotransfer-insecure-api-cve-2022-24562-a2c4a3f9149d', 'tags': ['Exploit', 'Third Party Advisory'], 'refsource': 'MISC'}
  • () https://medium.com/%40tomerp_77017/exploiting-iotransfer-insecure-api-cve-2022-24562-a2c4a3f9149d -

08 Aug 2023, 14:21

Type Values Removed Values Added
CWE CWE-287 CWE-306

Information

Published : 2022-06-16 19:15

Updated : 2024-11-21 06:50


NVD link : CVE-2022-24562

Mitre link : CVE-2022-24562

CVE.ORG link : CVE-2022-24562


JSON object : View

Products Affected

iobit

  • iotransfer
CWE
CWE-306

Missing Authentication for Critical Function