CVE-2023-7309

CRITICAL EXPLOITED

Dahua Smart Park Integrated Management Platform - Path Traversal

Title source: llm
STIX 2.1

Description

A path traversal vulnerability exists in the Dahua Smart Park Integrated Management Platform (also referred to as the Dahua Smart Campus Integrated Management Platform), affecting the SOAP-based GIS bitmap upload interface. The flaw allows unauthenticated remote attackers to upload arbitrary files to the server via crafted SOAP requests, including executable JSP payloads. Successful exploitation may lead to remote code execution (RCE) and full compromise of the affected system. The vulnerability is presumed to affect builds released prior to September 2023 and is said to be remediated in newer versions of the product, though the exact affected range remains undefined. Exploitation evidence was first observed by the Shadowserver Foundation on 2024-02-15 UTC.

Scores

CVSS v4 10.0
EPSS 0.0175
EPSS Percentile 82.6%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact total

Details

VulnCheck KEV 2024-02-15
CWE
CWE-22 CWE-434
Status published
Products (1)
Zhejiang Dahua Technology Co., Ltd./Smart Park Integrated Management Platform < pre-September 2023 builds
Published Aug 27, 2025
Tracked Since Feb 18, 2026