CVE-2019-6447

Scores

EPSS

0.713medium71.3%
0%20%40%60%80%100%

Percentile: 71.3%

CVSS

8.1high3.x
0246810

CVSS Score: 8.1/10

All CVSS Scores

CVSS 3.x
8.1

Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

CVSS 2.0
4.8

Vector: AV:A/AC:L/Au:N/C:P/I:P/A:N

Description

The ES File Explorer File Manager application through 4.1.9.7.4 for Android allows remote attackers to read arbitrary files or execute applications via TCP port 59777 requests on the local Wi-Fi network. This TCP port remains open after the ES application has been launched once, and responds to unauthenticated application/json data over HTTP.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

CWE-306

Exploits

Exploit ID: 50070

Source: exploitdb

URL: https://www.exploit-db.com/exploits/50070

Exploit ID: CVE-2019-6447

Source: github-poc

URL: https://github.com/Cmadhushanka/CVE-2019-6447-Exploitation

Vulnerable Software (1)

Type: Configuration

Vendor: *

Product: es_file_explorer_file_manager

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:estrongs:es_file_explorer_file_manager:*:*:*:*:*:android:*:*",      "versionEndIncluding": "4.1.9.7.4",      "vulnerable": true    }  ],  "op...

Source: nvd

End of list