SpinetiX Fusion Digital Signage 3.4.8 and lower contains an authenticated path traversal vulnerability that allows attackers to manipulate file backup and deletion operations through unverified input parameters. Attackers can exploit path traversal techniques in index.php to write backup files to arbitrary locations and delete files by manipulating backup and file delete requests.
History

Thu, 11 Dec 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 10 Dec 2025 21:00:00 +0000

Type Values Removed Values Added
Description SpinetiX Fusion Digital Signage 3.4.8 and lower contains an authenticated path traversal vulnerability that allows attackers to manipulate file backup and deletion operations through unverified input parameters. Attackers can exploit path traversal techniques in index.php to write backup files to arbitrary locations and delete files by manipulating backup and file delete requests.
Title SpinetiX Fusion Digital Signage 3.4.8 Authenticated Path Traversal via File Operations
Weaknesses CWE-22
References
Metrics cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-12-10T20:47:08.593Z

Updated: 2025-12-11T18:54:05.115Z

Reserved: 2025-12-09T11:05:19.895Z

Link: CVE-2020-36883

cve-icon Vulnrichment

Updated: 2025-12-11T16:04:32.336Z

cve-icon NVD

Status : Received

Published: 2025-12-10T21:15:59.697

Modified: 2025-12-11T19:15:46.937

Link: CVE-2020-36883

cve-icon Redhat

No data.