CVE-2024-13982

SPON IP Network Broadcast System, a digital audio transmission platform developed by SPON Communications, contains an arbitrary file read vulnerability in the rj_get_token.php endpoint. The flaw arises from insufficient input validation on the jsondata[url] parameter, which allows attackers to perform directory traversal and access sensitive files on the server. An unauthenticated remote attacker can exploit this vulnerability by sending a crafted POST request to read arbitrary files, potentially exposing system configuration, credentials, or internal logic. An affected version range is undefined.
CVSS

No CVSS.

Configurations

No configuration.

History

27 Aug 2025, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-27 22:15

Updated : 2025-08-29 16:24


NVD link : CVE-2024-13982

Mitre link : CVE-2024-13982

CVE.ORG link : CVE-2024-13982


JSON object : View

Products Affected

No product.

CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-200

Exposure of Sensitive Information to an Unauthorized Actor