Summary
A path traversal flaw in the SmartEMS upload handling allows authenticated users to direct upload data outside of the intended directory via the 'Upload-Key' header. In deployments where writable, code-interpreted paths are reachable, this may lead to remote code execution.
Impact
An authenticated attacker with network access to the SmartEMS Web UI can write outside the intended upload directory, overwrite or place files in sensitive locations, escalate to remote code execution depending on filesystem permissions and execution context, and access or modify sensitive data.
Affected Product(s)
Model no. | Product name | Affected versions |
---|---|---|
Welotec Software SmartEMS Web Application <v3.3.6 | Welotec Software SmartEMS Web Application <v3.3.6 |
Vulnerabilities
Expand / Collapse allThe upload endpoint insufficiently validates the 'Upload-Key' request header. By supplying path traversal sequences, an authenticated attacker can cause the server to create upload-related artifacts outside the intended storage location. In certain configurations this enables arbitrary file write and may be leveraged to achieve remote code execution.
Revision History
Version | Date | Summary |
---|---|---|
1.0.0 | 09/10/2025 09:00 | Initial revision. |
1.0.1 | 09/22/2025 10:00 | Changes impact note categorie from details to description |