WiFi File Transfer 1.0.8 contains a persistent cross-site scripting vulnerability that allows remote attackers to inject malicious script codes through file and folder names. Attackers can exploit the web server's input validation weakness to execute arbitrary JavaScript when users preview infected file paths, potentially compromising user browser sessions.
Metrics
Affected Vendors & Products
References
History
Tue, 03 Feb 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Smarterdroid
Smarterdroid wifi File Transfer |
|
| Vendors & Products |
Smarterdroid
Smarterdroid wifi File Transfer |
Mon, 02 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 01 Feb 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WiFi File Transfer 1.0.8 contains a persistent cross-site scripting vulnerability that allows remote attackers to inject malicious script codes through file and folder names. Attackers can exploit the web server's input validation weakness to execute arbitrary JavaScript when users preview infected file paths, potentially compromising user browser sessions. | |
| Title | WiFi File Transfer 1.0.8 Persistent XSS via Web Server Input Validation | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-02-01T12:56:57.389Z
Updated: 2026-02-02T19:24:31.380Z
Reserved: 2026-01-11T13:34:26.331Z
Link: CVE-2022-50951
Updated: 2026-02-02T19:24:14.622Z
Status : Awaiting Analysis
Published: 2026-02-01T13:15:57.817
Modified: 2026-02-03T16:44:36.630
Link: CVE-2022-50951
No data.