CVE-2026-30283
Arbitrary File Overwrite in PEAKSEL NIS Animal Sounds Leads to Code Execution
Publication date: 2026-03-31
Last updated on: 2026-04-06
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| peaksel | animal_sounds_and_ringtones | 1.3.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-30283 is an arbitrary file overwrite vulnerability found in PEAKSEL D.O.O.'s Animal Sounds and Ringtones app version 1.3.0. The flaw exists in the file import process within the component com.bra.classes.ExternalProcessorActivity, where insufficient security validation allows an attacker to manipulate both the filename and content of imported files.
By exploiting path traversal techniques, an attacker can overwrite critical internal files of the app's storage. This can lead to severe consequences such as arbitrary code execution, exposure of sensitive information, denial of service, app malfunction, or failure to launch.
The attack requires minimal user interaction and can be triggered automatically when the victim opens a malicious app crafted by the attacker.
How can this vulnerability impact me? :
This vulnerability can have several serious impacts on users of the affected app:
- Arbitrary code execution, allowing attackers to run malicious code within the app environment.
- Exposure of sensitive information stored within the app.
- Denial of service, causing the app to malfunction or fail to launch.
- Potential compromise of device security depending on the app's permissions and integration.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for unusual file import activities within the PEAKSEL D.O.O. NIS Animal Sounds and Ringtones v1.3.0 app, especially those involving path traversal attempts in filenames.
Since the vulnerability involves arbitrary file overwrite via crafted filenames during the file import process, detection can focus on identifying suspicious file paths or unexpected modifications to critical internal files.
Suggested commands to help detect exploitation attempts include:
- On Linux/Unix systems, use file integrity monitoring tools like 'tripwire' or 'aide' to detect unexpected changes in app files.
- Use commands like 'find' to check for recently modified files in the app directory, e.g., `find /path/to/app/data -type f -mtime -1` to find files modified in the last day.
- Monitor logs for unusual file import activities or errors related to file handling within the app.
- If possible, use Android debugging tools (adb) to inspect app storage and check for unexpected files or changes.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include preventing the exploitation of the arbitrary file overwrite vulnerability by restricting or disabling the file import functionality in the affected app version 1.3.0.
Avoid installing or opening untrusted or unknown apps that could trigger the malicious file import process.
If possible, update the app to a patched version that addresses this vulnerability once available from the vendor.
Implement file system permissions to restrict write access to critical internal files used by the app.
Monitor the app for suspicious behavior such as crashes, failure to launch, or unexpected file changes, and isolate affected devices if exploitation is suspected.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows attackers to overwrite critical internal files, potentially leading to arbitrary code execution or exposure of sensitive information.
Exposure of sensitive information due to this vulnerability could impact compliance with data protection regulations such as GDPR or HIPAA, which require safeguarding personal and sensitive data.
However, the provided information does not explicitly detail the nature of the data exposed or the specific compliance implications.