CVE-2022-50932
Severity CVSS v4.0:
HIGH
Type:
CWE-22
Path Traversal
Publication date:
13/01/2026
Last modified:
30/01/2026
Description
Kyocera Command Center RX ECOSYS M2035dn contains a directory traversal vulnerability that allows unauthenticated attackers to read sensitive system files by manipulating file paths under the /js/ path. Attackers can exploit the issue by sending requests like /js/../../../../.../etc/passwd%00.jpg (null-byte appended traversal) to access critical files such as /etc/passwd and /etc/shadow.
Impact
Base Score 4.0
8.70
Severity 4.0
HIGH
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:kyocera:command_center_rx:ecosys_m2035dn:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://www.exploit-db.com/exploits/50738
- https://www.kyoceradocumentsolutions.com/asia/en/products/business-application/command-center-rx.html
- https://www.vulncheck.com/advisories/kyocera-command-center-rx-ecosys-mdn-directory-traversal-file-disclosure-unauthenticated
- https://www.exploit-db.com/exploits/50738



