PT-2025-34953 · Spon Communications · Spon Ip Network Broadcast System

Keepb1Lue

·

Published

2025-08-27

·

Updated

2025-08-28

·

CVE-2024-13982

CVSS v4.0
8.7
VectorAV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Name of the Vulnerable Software and Affected Versions:

SPON IP Network Broadcast System (affected versions not specified)

Description:

SPON IP Network Broadcast System, a digital audio transmission platform developed by SPON Communications, contains an arbitrary file read flaw. The issue stems from inadequate input validation on the `jsondata[url]` parameter within the `/rj get token.php` endpoint. This allows attackers to perform directory traversal and access sensitive files on the server. An unauthenticated remote attacker can exploit this by sending a crafted POST request to read arbitrary files, potentially exposing system configuration, credentials, or internal logic.

Recommendations:

At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Exploit

Information Disclosure

Path traversal

Weakness Enumeration

Related Identifiers

CVE-2024-13982

Affected Products

Spon Ip Network Broadcast System