CVE-2026-30287
Arbitrary File Overwrite in ACE Scanner PDF Leads to Code Execution
Publication date: 2026-04-01
Last updated on: 2026-04-02
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| deepthought.industries | ace_scanner | 1.4.5 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-73 | The product allows user input to control or influence paths or file names that are used in filesystem operations. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability in Deep Thought Industries ACE Scanner PDF Scanner v1.4.5 allows attackers to overwrite critical internal files, potentially leading to arbitrary code execution or exposure of sensitive information.
Such exposure or unauthorized access to sensitive information could negatively impact compliance with data protection regulations like GDPR or HIPAA, which require safeguarding personal and sensitive data against unauthorized access or breaches.
However, the provided information does not explicitly detail the direct impact on compliance with these standards or any specific regulatory consequences.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include preventing exploitation of the arbitrary file overwrite vulnerability by restricting or monitoring the file import process in ACE Scanner PDF Scanner v1.4.5.
- Avoid opening or importing files from untrusted or unknown sources within the app.
- If possible, uninstall or disable the vulnerable version (1.4.5) of the ACE Scanner app until a patched version is available.
- Monitor the app's storage for unauthorized file modifications or suspicious activity.
- Contact the app developer or check for updates that address this vulnerability.
Can you explain this vulnerability to me?
CVE-2026-30287 is an arbitrary file overwrite vulnerability found in Deep Thought Industries ACE Scanner PDF Scanner version 1.4.5. The flaw exists in the file import process of the app, specifically in the component FileReaderSplashActivity, where insufficient security validation allows attackers to manipulate filenames and contents of imported files using path traversal techniques.
This manipulation enables attackers to overwrite critical internal files within the appβs storage, including executable and configuration files, which can lead to severe security issues.
How can this vulnerability impact me? :
Exploitation of this vulnerability can have multiple serious impacts including arbitrary code execution, which means attackers can run malicious code on the device.
It can also lead to exposure of sensitive information stored within the app, denial of service causing the app to malfunction or fail to launch, and privilege escalation allowing attackers to gain higher access rights.
The attack requires minimal user interaction and can be triggered automatically when a victim opens a malicious app, increasing the risk of compromise.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
The vulnerability in ACE Scanner PDF Scanner v1.4.5 is due to an arbitrary file overwrite flaw in the file import process, which can be exploited via path traversal techniques. Detection involves monitoring for suspicious file import activities that manipulate filenames or paths to overwrite internal files.
Since the vulnerability is triggered when the victim opens a malicious app or imports a crafted file, detection can focus on identifying unusual file import operations or unexpected modifications to critical internal files within the app's storage.
Specific commands are not provided in the resources, but general approaches include:
- Monitoring file system changes in the app's storage directory for unexpected overwrites.
- Using Android debugging tools (adb) to check the app's file directories for suspicious files or altered configuration/executable files.
- Checking app logs for errors or unusual behavior related to file imports.
- Scanning for installed app version 1.4.5 of ACE Scanner to identify vulnerable installations.