A remote code execution vulnerability in the project management of Wanxing Technology's Yitu project which allows an attacker to use the exp.adpx file as a zip compressed file to construct a special file name, which can be used to decompress the project file into the system startup folder, restart the system, and automatically execute the constructed attack script.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 22 Nov 2024 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-22 |
Wed, 13 Nov 2024 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wondershare
Wondershare edraw |
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:wondershare:edraw:3.2.2:*:*:*:*:*:*:* | |
| Vendors & Products |
Wondershare
Wondershare edraw |
|
| Metrics |
cvssV3_1
|
Wed, 02 Oct 2024 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A remote code execution vulnerability in the project management of Wanxing Technology's Yitu project which allows an attacker to use the exp.adpx file as a zip compressed file to construct a special file name, which can be used to decompress the project file into the system startup folder, restart the system, and automatically execute the constructed attack script. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-02T20:10:28.480Z
Reserved: 2024-01-25T00:00:00
Link: CVE-2024-24122
No data.
Status : Modified
Published: 2024-10-02T18:15:04.957
Modified: 2024-11-21T08:58:56.470
Link: CVE-2024-24122
No data.
OpenCVE Enrichment
No data.
Weaknesses