CVE-2024-49359
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
24/10/2024
Last modified:
22/09/2025
Description
ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In version 1.2.4 and all prior versions, the API endpoint `http:///v2_1/file` in ZimaOS is vulnerable to a directory traversal attack, allowing authenticated users to list the contents of any directory on the server. By manipulating the path parameter, attackers can access sensitive system directories such as `/etc`, potentially exposing critical configuration files and increasing the risk of further attacks. As of time of publication, no known patched versions are available.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:zimaspace:zimaos:*:*:*:*:*:*:*:* | 1.2.5 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



