PT-2025-34938 · Dahua · Smart Park Integrated Management Platform +1

Li Huohuo

·

Published

2025-08-27

·

Updated

2025-08-28

·

CVE-2023-7309

CVSS v4.0
10
VectorAV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Name of the Vulnerable Software and Affected Versions:

Dahua Smart Park Integrated Management Platform (also referred to as the Dahua Smart Campus Integrated Management Platform) (affected versions not specified)

Description:

A path traversal vulnerability exists in the SOAP-based GIS bitmap upload interface. The flaw allows unauthenticated remote attackers to upload arbitrary files to the server via crafted SOAP requests, including executable JSP payloads. Successful exploitation may lead to remote code execution (RCE) and full compromise of the affected system.

Recommendations:

At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Exploit

RCE

Unrestricted File Upload

Path traversal

Weakness Enumeration

Related Identifiers

CVE-2023-7309

Affected Products

Dahua Smart Campus Integrated Management Platform
Smart Park Integrated Management Platform