CVE-2024-0716: Info disclosure in Beijing Baichuo Smart S150 Management Platform V31R02B15. Allows remote exploitation.
This CVE-2024-0716 relates to an information disclosure vulnerability found in Beijing Baichuo Smart S150 Management Platform V31R02B15. The vulnerability affects the Backup File Handler component, specifically the file /log/download.php, allowing for remote exploitation with high complexity.
Understanding CVE-2024-0716
This vulnerability, assigned the identifier VDB-251541, enables attackers to disclose sensitive information by manipulating the affected file within the Smart S150 Management Platform. Despite being alerted to this issue, the vendor did not respond.
What is CVE-2024-0716?
The vulnerability in Beijing Baichuo Smart S150 Management Platform V31R02B15 enables unauthorized disclosure of information when exploiting the Backup File Handler component.
The Impact of CVE-2024-0716
The exploitation of this vulnerability could lead to the exposure of sensitive data, posing a risk to the confidentiality of information stored within the affected system.
Technical Details of CVE-2024-0716
This vulnerability has been assigned a low base severity score, with a CVSS v3.1 base score of 3.1 and a CVSS v2.0 base score of 2.1. It has been classified as having a low impact on the confidentiality of the affected system.
Vulnerability Description
The vulnerability allows for the unauthorized disclosure of information within the Beijing Baichuo Smart S150 Management Platform, affecting the Backup File Handler component.
Affected Systems and Versions
Exploitation Mechanism
Attackers can exploit this vulnerability remotely, targeting the /log/download.php file of the Backup File Handler component, with a high level of complexity and difficulty in exploitation.
Mitigation and Prevention
To mitigate the risks associated with CVE-2024-0716, immediate actions should be taken, followed by implementing long-term security practices and ensuring timely patching and updates.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates