TenderDocTransfer developed by Chunghwa Telecom has a Arbitrary File Copy and Paste vulnerability. The application sets up a simple local web server and provides APIs for communication with the target website. Due to the lack of CSRF protection in the APIs, unauthenticated remote attackers could use these APIs through phishing. Additionally, one of the APIs contains an Absolute Path Traversal vulnerability. Attackers can copy arbitrary files on the user's system and paste them into any path, which poses a potential risk of information leakage or could consume hard drive space by copying files in large volumes.
References
| Link | Resource |
|---|---|
| https://www.twcert.org.tw/en/cp-139-10511-10f3a-2.html | Third Party Advisory |
| https://www.twcert.org.tw/tw/cp-132-10510-3719c-1.html | Third Party Advisory |
Configurations
History
19 Dec 2025, 17:01
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:cht:tenderdoctransfer:*:*:*:*:*:*:*:* | |
| First Time |
Cht
Cht tenderdoctransfer |
|
| References | () https://www.twcert.org.tw/en/cp-139-10511-10f3a-2.html - Third Party Advisory | |
| References | () https://www.twcert.org.tw/tw/cp-132-10510-3719c-1.html - Third Party Advisory |
17 Nov 2025, 04:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-17 04:15
Updated : 2025-12-19 17:01
NVD link : CVE-2025-13283
Mitre link : CVE-2025-13283
CVE.ORG link : CVE-2025-13283
JSON object : View
Products Affected
cht
- tenderdoctransfer
