Metrics
Affected Vendors & Products
No advisories yet.
Solution
The manufacturer claims to have fixed the vulnerability.
Workaround
No workaround given by the vendor.
Wed, 18 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 18 Feb 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Path traversal vulnerability in the AMR Printer Management 1.01 Beta web service, which allows remote attackers to read arbitrary files from the underlying Windows system by using specially crafted path traversal sequences in requests directed to the web management service. The service is accessible without authentication and runs with elevated privileges, amplifying the impact of the vulnerability. An attacker can exploit this condition to access sensitive and privileged files on the system using path traversal payloads. Successful exploitation of this vulnerability could lead to the unauthorized disclosure of internal system information, compromising the confidentiality of the affected environment. | |
| Title | Directory Traversal in AMR Printer Management by AMR | |
| First Time appeared |
Amr
Amr amr Printer Management Beta Web Service |
|
| Weaknesses | CWE-22 | |
| CPEs | cpe:2.3:a:amr:amr_printer_management_beta_web_service:1.01:*:*:*:*:*:*:* | |
| Vendors & Products |
Amr
Amr amr Printer Management Beta Web Service |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2026-02-18T14:47:38.856Z
Reserved: 2026-02-13T12:10:06.897Z
Link: CVE-2026-2464
Updated: 2026-02-18T14:47:30.515Z
Status : Received
Published: 2026-02-18T14:16:07.120
Modified: 2026-02-18T14:16:07.120
Link: CVE-2026-2464
No data.
OpenCVE Enrichment
No data.