7.8
CWE
732
Advisory Published
Updated

CVE-2020-28055

First published: Tue Nov 10 2020(Updated: )

A vulnerability in the TCL Android Smart TV series V8-R851T02-LF1 V295 and below and V8-T658T01-LF1 V373 and below by TCL Technology Group Corporation allows a local unprivileged attacker, such as a malicious App, to read & write to the /data/vendor/tcl, /data/vendor/upgrade, and /var/TerminalManager directories within the TV file system. An attacker, such as a malicious APK or local unprivileged user could perform fake system upgrades by writing to the /data/vendor/upgrage folder.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Tcl 32s330 Firmware<v8-r851t10-lf1v091
Tcl 32s330
Tcl 40s330 Firmware<v8-r851t10-lf1v091
Tcl 40s330
Tcl 43s434 Firmware<v8-r851t02-lf1v440
Tcl 43s434
Tcl 50s434 Firmware<v8-r851t02-lf1v440
Tcl 50s434
Tcl 55s434 Firmware<v8-r851t02-lf1v440
Tcl 55s434
Tcl 65s434 Firmware<v8-r851t02-lf1v440
Tcl 65s434
Tcl 75s434 Firmware<v8-r851t02-lf1v440
Tcl 75s434

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203