First published: Tue Apr 02 2024(Updated: )
A vulnerability classified as critical has been found in Shibang Communications IP Network Intercom Broadcasting System 1.0. This affects an unknown part of the file /php/busyscreenshotpush.php. The manipulation of the argument jsondata[callee]/jsondata[imagename] leads to path traversal: '../filedir'. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-259065 was assigned to this vulnerability.
Credit: cna@vuldb.com
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.