CVE-2026-22070
Analyzed
Analyzed - Analysis Complete
Unauthenticated File Path Traversal in ColorOS Assistant
Publication date: 2026-04-30
Last updated on: 2026-05-05
Assigner: OPPO Mobile Telecommunication Corp., Ltd.
Description
Description
ColorOS Assistant has an unauthenticated start-download channel, leading to file path traversal.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| oppo | coloros_assistant | 1.4.26 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
| CWE-23 | The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ".." that can resolve to a location that is outside of that directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability in ColorOS Assistant involves an unauthenticated start-download channel that allows an attacker to perform file path traversal.
How can this vulnerability impact me? :
This vulnerability can lead to unauthorized file access or modification due to file path traversal. It may result in integrity loss and high impact on availability.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70