{"uuid": "753fcdaa-5d12-4b01-83a7-c6236377d0f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43658", "type": "seen", "source": "https://t.me/cvedetector/14812", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43658 - Iocharger Home File Traversal and Deletion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43658 \nPublished : Jan. 9, 2025, 8:15 a.m. | 40\u00a0minutes ago \nDescription : Patch traversal, External Control of File Name or Path vulnerability in  Iocharger Home allows deletion of arbitrary files  \nThis issue affects Iocharger firmware for AC model before firmware version 25010801.  \n  \nLikelihood: High, but requires authentication  \n  \nImpact: Critical \u2013 The vulnerability can be used to delete any file on the charging station, severely impacting the integrity of the charging station. Furthermore, the vulnerability could be used to delete binaries required for the functioning of the charging station, severely impacting the availability of the charging station.  \n  \nCVSS clarification: Any network interface serving the web ui is vulnerable (AV:N) and there are not additional security measures to circumvent (AC:L), nor does the attack require and existing preconditions (AT:N). The attack is authenticated, but the level of authentication does not matter (PR:L), nor is any user interaction required (UI:N). The attack leads compromised of the integrity and availability of the device (VVC:N/VI:H/VA:H), with no effect on subsequent systems (SC:N/SI:N/SA:N). We do not forsee a safety impact (S:N). This attack can be automated (AU:Y). \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T10:13:58.000000Z"}