A vulnerability was found in iteaj iboot 物联网网关 1.1.3 and classified as problematic. This issue affects some unknown processing of the file /common/upload/batch of the component File Upload. The manipulation of the argument File leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://github.com/uglory-gll/javasec/blob/main/iboot.md#22commonuploadbatch-arbitrary-file-upload | Exploit |
https://vuldb.com/?ctiid.303539 | Permissions Required VDB Entry |
https://vuldb.com/?id.303539 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.551871 | Third Party Advisory VDB Entry |
https://github.com/uglory-gll/javasec/blob/main/iboot.md#22commonuploadbatch-arbitrary-file-upload | Exploit |
Configurations
History
08 Apr 2025, 18:53
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:iteaj:iboot:1.1.3:*:*:*:*:*:*:* | |
First Time |
Iteaj iboot
Iteaj |
|
References | () https://github.com/uglory-gll/javasec/blob/main/iboot.md#22commonuploadbatch-arbitrary-file-upload - Exploit | |
References | () https://vuldb.com/?ctiid.303539 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.303539 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.551871 - Third Party Advisory, VDB Entry |
07 Apr 2025, 14:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/uglory-gll/javasec/blob/main/iboot.md#22commonuploadbatch-arbitrary-file-upload - | |
Summary |
|
07 Apr 2025, 01:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-07 01:15
Updated : 2025-04-08 18:53
NVD link : CVE-2025-3327
Mitre link : CVE-2025-3327
CVE.ORG link : CVE-2025-3327
JSON object : View
Products Affected
iteaj
- iboot