Home

Description

SpinetiX Fusion Digital Signage 3.4.8 and lower contains an authenticated path traversal vulnerability that allows attackers to manipulate file backup and deletion operations through unverified input parameters. Attackers can exploit path traversal techniques in index.php to write backup files to arbitrary locations and delete files by manipulating backup and file delete requests.

PUBLISHED Reserved 2025-12-09 | Published 2025-12-10 | Updated 2025-12-11 | Assigner VulnCheck




HIGH: 8.8CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

Default status
unaffected

Any version
affected

Credits

LiquidWorm as Gjoko Krstic of Zero Science Lab finder

References

www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5594.php exploit

www.exploit-db.com/exploits/48844 (ExploitDB-48844) exploit

www.spinetix.com (Official Product Homepage) product

www.zeroscience.mk/en/vulnerabilities/ZSL-2020-5594.php (Zero Science Lab Disclosure ZSL-2020-5594) third-party-advisory

github.com/Mbed-TLS/mbedtls (Mbed TLS GitHub Repository) product

www.vulncheck.com/...ated-path-traversal-via-file-operations (VulnCheck Advisory: SpinetiX Fusion Digital Signage 3.4.8 Authenticated Path Traversal via File Operations) third-party-advisory

cve.org (CVE-2020-36883)

nvd.nist.gov (CVE-2020-36883)

Download JSON