Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-33673 | The default TCL Camera application exposes a provider vulnerable to path traversal vulnerability. Malicious application can supply malicious URI path and delete arbitrary files from user’s external storage. |
Thu, 14 Nov 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 14 Nov 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The default TCL Camera application exposes a provider vulnerable to path traversal vulnerability. Malicious application can supply malicious URI path and delete arbitrary files from user’s external storage. | |
| Title | Arbitrary file removal via path traversal in TCL Camera | |
| Weaknesses | CWE-35 | |
| References |
| |
| Metrics |
cvssV4_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2024-11-14T15:59:14.006Z
Reserved: 2024-11-12T12:11:03.801Z
Link: CVE-2024-11136
Updated: 2024-11-14T15:59:09.250Z
Status : Deferred
Published: 2024-11-14T16:15:18.273
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-11136
No data.
OpenCVE Enrichment
No data.
EUVD