7.2
CVE-2022-45427
- EPSS 0.18%
- Veröffentlicht 27.12.2022 18:15:10
- Zuletzt bearbeitet 14.04.2025 14:15:20
- Quelle cybersecurity@dahuatech.com
- CVE-Watchlists
- Unerledigt
Some Dahua software products have a vulnerability of unrestricted upload of file. After obtaining the permissions of administrators, by sending a specific crafted packet to the vulnerable interface, an attacker can upload arbitrary files.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Dahuasecurity ≫ Dss Express Version7.002.1760000.2
Dahuasecurity ≫ Dss Express Version8.0.2
Dahuasecurity ≫ Dss Express Version8.0.4
Dahuasecurity ≫ Dss Express Version8.1
Dahuasecurity ≫ Dss Express Version8.1.1
Dahuasecurity ≫ Dss Professional Version7.002.1760000.2
Dahuasecurity ≫ Dss Professional Version8.0.2
Dahuasecurity ≫ Dss Professional Version8.0.4
Dahuasecurity ≫ Dss Professional Version8.1
Dahuasecurity ≫ Dss Professional Version8.1.1
Dahuasecurity ≫ Dhi-dss7016d-s2 Firmware Version1.001.0000001.2
Dahuasecurity ≫ Dhi-dss7016d-s2 Firmware Version8.0.2
Dahuasecurity ≫ Dhi-dss7016d-s2 Firmware Version8.0.4
Dahuasecurity ≫ Dhi-dss7016d-s2 Firmware Version8.1
Dahuasecurity ≫ Dhi-dss7016dr-s2 Firmware Version1.001.0000001.2
Dahuasecurity ≫ Dhi-dss7016dr-s2 Firmware Version8.0.2
Dahuasecurity ≫ Dhi-dss7016dr-s2 Firmware Version8.0.4
Dahuasecurity ≫ Dhi-dss7016dr-s2 Firmware Version8.1
Dahuasecurity ≫ Dhi-dss4004-s2 Firmware Version1.001.0000001.2
Dahuasecurity ≫ Dhi-dss4004-s2 Firmware Version8.0.2
Dahuasecurity ≫ Dhi-dss4004-s2 Firmware Version8.0.4
Dahuasecurity ≫ Dhi-dss4004-s2 Firmware Version8.1
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.18% | 0.401 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.2 | 1.2 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | 7.2 | 1.2 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
CWE-434 Unrestricted Upload of File with Dangerous Type
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.