The topm-client from Chunghwa Telecom has an Arbitrary File Delete vulnerability. The application sets up a simple local web server and provides APIs for communication with the target website. Due to the lack of CSRF protection in the APIs, unauthenticated remote attackers could use these APIs through phishing. Additionally, one of the APIs contains an Absolute Path Traversal vulnerability, allowing attackers to delete arbitrary files on the user's system.
Metrics
Affected Vendors & Products
References
History
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Mon, 16 Dec 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 16 Dec 2024 07:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The topm-client from Chunghwa Telecom has an Arbitrary File Delete vulnerability. The application sets up a simple local web server and provides APIs for communication with the target website. Due to the lack of CSRF protection in the APIs, unauthenticated remote attackers could use these APIs through phishing. Additionally, one of the APIs contains an Absolute Path Traversal vulnerability, allowing attackers to delete arbitrary files on the user's system. | |
| Title | Chunghwa Telecom topm-client - Arbitrary File Delete | |
| Weaknesses | CWE-352 CWE-36 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: twcert
Published: 2024-12-16T06:54:03.176Z
Updated: 2024-12-16T16:33:50.477Z
Reserved: 2024-12-16T01:39:28.181Z
Link: CVE-2024-12646
Updated: 2024-12-16T16:33:43.919Z
Status : Received
Published: 2024-12-16T07:15:06.737
Modified: 2024-12-16T07:15:06.737
Link: CVE-2024-12646
No data.