CVE-2026-30277
Received Received - Intake
Arbitrary File Overwrite in TA/UTAX Mobile Print Enables Code Execution

Publication date: 2026-03-31

Last updated on: 2026-04-03

Assigner: MITRE

Description
An arbitrary file overwrite vulnerability in PDF Reader App : TA/UTAX Mobile Print v3.7.2.251001 allows attackers to overwrite critical internal files via the file import process, leading to arbitrary code execution or information exposure.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-31
Last Modified
2026-04-03
Generated
2026-05-07
AI Q&A
2026-03-31
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
triumph-adler mobile_print 3.7.2.251001
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-30277 is an arbitrary file overwrite vulnerability in the PDF Reader component of the TA/UTAX Mobile Print app version 3.7.2.251001. This flaw occurs because the app does not properly validate files during the import process, allowing an attacker to craft malicious files that overwrite critical internal files within the app's storage.

By exploiting this vulnerability, an attacker can use path traversal techniques to control both the filename and content of imported files, overwriting essential configuration or executable files. This can lead to severe consequences such as arbitrary code execution, exposure of sensitive information, denial of service, app malfunction, or failure to launch.

The attack can be triggered automatically when the victim opens the malicious app and does not require complex user interaction.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows attackers to overwrite critical internal files in the TA/UTAX Mobile Print app, potentially leading to arbitrary code execution or exposure of sensitive information.

Exposure of sensitive information due to this vulnerability could impact compliance with data protection regulations such as GDPR or HIPAA, which require safeguarding personal and sensitive data against unauthorized access or disclosure.

However, the provided information does not explicitly detail the direct effects on compliance with these standards or any specific regulatory implications.


How can this vulnerability impact me? :

This vulnerability can have several serious impacts on users of the TA/UTAX Mobile Print app:

  • Arbitrary code execution, allowing attackers to run malicious code within the app environment.
  • Exposure of sensitive information stored within the app.
  • Denial of service, causing the app to malfunction or fail to launch.
  • Potential compromise of device security due to overwritten critical files.

How can this vulnerability be detected on my network or system? Can you suggest some commands?

The vulnerability arises from an arbitrary file overwrite in the TA/UTAX Mobile Print app version 3.7.2.251001 during the file import process. Detection would involve monitoring the app for unusual file modifications or overwrites, especially within its internal storage files related to configuration or executables.

Since the vulnerability can be triggered automatically when opening a malicious app, detection could include scanning for suspicious or unauthorized apps that attempt to import files with crafted filenames using path traversal techniques.

No specific commands are provided in the available resources. However, general detection steps might include:

  • Monitoring file integrity of the app's internal storage directories for unexpected changes.
  • Using mobile device management (MDM) tools to detect installation or execution of unauthorized or suspicious apps.
  • Checking app logs for errors or unusual behavior related to file imports.

What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps should focus on preventing exploitation of the arbitrary file overwrite vulnerability in TA/UTAX Mobile Print app version 3.7.2.251001.

  • Avoid importing files from untrusted or unknown sources into the app.
  • Restrict installation and execution of untrusted or unknown apps on devices using the TA/UTAX Mobile Print app.
  • Monitor and restrict file import processes to ensure filenames do not contain path traversal sequences.
  • Check for updates or patches from the vendor (TA Triumph-Adler GmbH) that address this vulnerability and apply them as soon as they become available.

Since the vulnerability allows arbitrary code execution or information exposure, limiting app permissions and isolating the app environment can also reduce risk.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart