CVE-2021-47850
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-21

Last updated on: 2026-02-02

Assigner: VulnCheck

Description
Mini Mouse 9.2.0 contains a path traversal vulnerability that allows remote attackers to access arbitrary system files and directories through crafted HTTP requests. Attackers can retrieve sensitive files like win.ini and list contents of system directories such as C:\Users\Public by manipulating file and path parameters.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-21
Last Modified
2026-02-02
Generated
2026-05-07
AI Q&A
2026-01-21
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
yodinfo mini_mouse 9.2.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2021-47850 is a path traversal vulnerability in Mini Mouse version 9.2.0. It allows remote attackers to send specially crafted HTTP requests that manipulate file and path parameters to access arbitrary system files and directories. This means attackers can retrieve sensitive files like 'win.ini' and list contents of system directories such as 'C:\Users\Public' without authorization. [1, 2]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided resources do not specify how this vulnerability affects compliance with common standards and regulations such as GDPR or HIPAA.


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized disclosure of sensitive system files and directory contents. Attackers can access configuration files and potentially sensitive data stored on the system, which may lead to further attacks or information leakage. Because the vulnerability requires no privileges or user interaction, it can be exploited remotely over the network, increasing the risk to affected systems. [1, 2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by sending crafted HTTP requests to the Mini Mouse 9.2.0 application's web interface and observing if arbitrary files or directory listings are returned. For example, you can use curl commands to test the vulnerability: 1. To retrieve the contents of a sensitive file like win.ini: curl -i "http://<target-ip>/file=C:\Windows\win.ini" 2. To list contents of a directory such as C:\Users\Public: curl -X POST -H "Content-Type: application/json" -d '{"path":"C:\\Users\\Public"}' "http://<target-ip>/op=get_file_list" If the server responds with the file contents or directory listing, the system is vulnerable. [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart