Skip to main content

CVE-2024-0939: CWE-434 Unrestricted Upload in Byzoro Smart S210 Management Platform

Medium
VulnerabilityCVE-2024-0939cvecve-2024-0939cwe-434
Published: Fri Jan 26 2024 (01/26/2024, 18:31:03 UTC)
Source: CVE Database V5
Vendor/Project: Byzoro
Product: Smart S210 Management Platform

Description

A vulnerability has been found in Byzoro Smart S210 Management Platform up to 20240117 and classified as critical. This vulnerability affects unknown code of the file /Tool/uploadfile.php. The manipulation of the argument file_upload leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-252184. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 07/07/2025, 23:42:31 UTC

Technical Analysis

CVE-2024-0939 is a vulnerability classified under CWE-434 (Unrestricted File Upload) affecting the Byzoro Smart S210 Management Platform up to version 20240117. The vulnerability resides in the /Tool/uploadfile.php endpoint, where the file_upload parameter is improperly validated, allowing an attacker to upload arbitrary files without restriction. This flaw can be exploited remotely without user interaction and requires low privileges (PR:L) on the system, indicating that some level of authentication is necessary but no user interface interaction is needed. The vulnerability has a CVSS v3.1 base score of 6.3, reflecting a medium severity level, with impacts on confidentiality, integrity, and availability. Specifically, the attacker could upload malicious files such as web shells or scripts, potentially leading to remote code execution, data leakage, or service disruption. The vendor was contacted but did not respond, and no patches have been released yet. Although no known exploits are currently observed in the wild, the public disclosure of the vulnerability and the availability of exploit details increase the risk of exploitation. The unrestricted upload vulnerability is critical in environments where the management platform is exposed to untrusted networks or users, as it can serve as an entry point for further compromise.

Potential Impact

For European organizations using the Byzoro Smart S210 Management Platform, this vulnerability poses a significant risk. The platform likely manages critical infrastructure or operational technology given its designation as a 'management platform.' Successful exploitation could lead to unauthorized access, data breaches, or disruption of services, impacting business continuity and regulatory compliance, especially under GDPR and other data protection laws. The ability to upload arbitrary files could allow attackers to deploy malware or ransomware, causing operational downtime and financial losses. Additionally, the lack of vendor response and absence of patches increases the window of exposure. Organizations in sectors such as manufacturing, utilities, or smart building management that rely on this platform could face targeted attacks, potentially affecting sensitive or critical systems. The medium severity rating suggests that while the vulnerability is serious, exploitation requires some level of authentication, which may limit exposure to internal threats or attackers who have already gained partial access.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement immediate compensating controls. First, restrict access to the management platform to trusted networks and users only, using network segmentation and VPNs to limit exposure. Implement strict authentication and authorization controls to ensure only legitimate users can access upload functionalities. Monitor and log all file upload activities for suspicious behavior, including unexpected file types or sizes. Employ web application firewalls (WAFs) with rules to detect and block malicious file uploads targeting the /Tool/uploadfile.php endpoint. Conduct regular vulnerability scanning and penetration testing focused on file upload mechanisms. If possible, implement file integrity monitoring and restrict executable permissions on upload directories to prevent execution of uploaded malicious files. Organizations should also prepare incident response plans specific to this vulnerability and stay alert for vendor updates or patches. Finally, consider isolating the affected platform from critical networks until a fix is available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-01-26T11:03:37.865Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68387d4f182aa0cae28316e4

Added to database: 5/29/2025, 3:29:19 PM

Last enriched: 7/7/2025, 11:42:31 PM

Last updated: 8/4/2025, 4:58:24 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats