CVE-2026-30277
Arbitrary File Overwrite in TA/UTAX Mobile Print Enables Code Execution
Publication date: 2026-03-31
Last updated on: 2026-04-03
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| triumph-adler | mobile_print | 3.7.2.251001 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-30277 is an arbitrary file overwrite vulnerability in the PDF Reader component of the TA/UTAX Mobile Print app version 3.7.2.251001. This flaw occurs because the app does not properly validate files during the import process, allowing an attacker to craft malicious files that overwrite critical internal files within the app's storage.
By exploiting this vulnerability, an attacker can use path traversal techniques to control both the filename and content of imported files, overwriting essential configuration or executable files. This can lead to severe consequences such as arbitrary code execution, exposure of sensitive information, denial of service, app malfunction, or failure to launch.
The attack can be triggered automatically when the victim opens the malicious app and does not require complex user interaction.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows attackers to overwrite critical internal files in the TA/UTAX Mobile Print app, potentially leading to arbitrary code execution or exposure of sensitive information.
Exposure of sensitive information due to this vulnerability could impact compliance with data protection regulations such as GDPR or HIPAA, which require safeguarding personal and sensitive data against unauthorized access or disclosure.
However, the provided information does not explicitly detail the direct effects on compliance with these standards or any specific regulatory implications.
How can this vulnerability impact me? :
This vulnerability can have several serious impacts on users of the TA/UTAX Mobile Print app:
- Arbitrary code execution, allowing attackers to run malicious code within the app environment.
- Exposure of sensitive information stored within the app.
- Denial of service, causing the app to malfunction or fail to launch.
- Potential compromise of device security due to overwritten critical files.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
The vulnerability arises from an arbitrary file overwrite in the TA/UTAX Mobile Print app version 3.7.2.251001 during the file import process. Detection would involve monitoring the app for unusual file modifications or overwrites, especially within its internal storage files related to configuration or executables.
Since the vulnerability can be triggered automatically when opening a malicious app, detection could include scanning for suspicious or unauthorized apps that attempt to import files with crafted filenames using path traversal techniques.
No specific commands are provided in the available resources. However, general detection steps might include:
- Monitoring file integrity of the app's internal storage directories for unexpected changes.
- Using mobile device management (MDM) tools to detect installation or execution of unauthorized or suspicious apps.
- Checking app logs for errors or unusual behavior related to file imports.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps should focus on preventing exploitation of the arbitrary file overwrite vulnerability in TA/UTAX Mobile Print app version 3.7.2.251001.
- Avoid importing files from untrusted or unknown sources into the app.
- Restrict installation and execution of untrusted or unknown apps on devices using the TA/UTAX Mobile Print app.
- Monitor and restrict file import processes to ensure filenames do not contain path traversal sequences.
- Check for updates or patches from the vendor (TA Triumph-Adler GmbH) that address this vulnerability and apply them as soon as they become available.
Since the vulnerability allows arbitrary code execution or information exposure, limiting app permissions and isolating the app environment can also reduce risk.