An input neutralization vulnerability in the Backup Configuration component of Crafty Controller allows a remote, authenticated attacker to perform file tampering and remote code execution via path traversal.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://gitlab.com/crafty-controller/crafty-4/-/issues/650 |
|
History
Thu, 26 Feb 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Craftycontrol
Craftycontrol crafty Controller |
|
| CPEs | cpe:2.3:a:craftycontrol:crafty_controller:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Craftycontrol
Craftycontrol crafty Controller |
Tue, 03 Feb 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Arcadia Technology
Arcadia Technology crafty Controller |
|
| Vendors & Products |
Arcadia Technology
Arcadia Technology crafty Controller |
Mon, 02 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 30 Jan 2026 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An input neutralization vulnerability in the Backup Configuration component of Crafty Controller allows a remote, authenticated attacker to perform file tampering and remote code execution via path traversal. | |
| Title | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Crafty Controller | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitLab
Published: 2026-01-30T06:04:15.330Z
Updated: 2026-02-02T16:33:11.255Z
Reserved: 2026-01-09T10:40:55.812Z
Link: CVE-2026-0805
Updated: 2026-01-30T14:23:55.487Z
Status : Analyzed
Published: 2026-01-30T07:16:14.917
Modified: 2026-02-26T19:57:06.950
Link: CVE-2026-0805
No data.