CVE-2021-47849

MEDIUM
2026-01-21 [email protected]
6.2
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None

Lifecycle Timeline

3
Analysis Generated
Mar 12, 2026 - 21:54 vuln.today
PoC Detected
Feb 02, 2026 - 17:38 vuln.today
Public exploit code
CVE Published
Jan 21, 2026 - 18:16 nvd
MEDIUM 6.2

Description

Mini Mouse 9.3.0 contains a path traversal vulnerability that allows attackers to access sensitive system directories through the device information endpoint. Attackers can retrieve file lists from system directories like /usr, /etc, and /var by manipulating file path parameters in API requests.

Analysis

Mini Mouse 9.3.0 contains a path traversal vulnerability that allows attackers to access sensitive system directories through the device information endpoint. Attackers can retrieve file lists from system directories like /usr, /etc, and /var by manipulating file path parameters in API requests. [CVSS 6.2 MEDIUM]

Technical Context

Classified as CWE-22 (Path Traversal). Affects the device information component of Mini Mouse. Mini Mouse 9.3.0 contains a path traversal vulnerability that allows attackers to access sensitive system directories through the device information endpoint. Attackers can retrieve file lists from system directories like /usr, /etc, and /var by manipulating file path parameters in API requests.

Affected Products

Vendor: Yodinfo. Product: Mini Mouse. Versions: up to 9.3.0. Component: device information.

Remediation

Monitor vendor advisories for a patch. Validate and sanitize file path inputs. Use allowlists.

Priority Score

51
Low Medium High Critical
KEV: 0
EPSS: +0.2
CVSS: +31
POC: +20

Share

CVE-2021-47849 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy