Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-43616— Detect-It-Easy < 3.21 Path Traversal Arbitrary File Write

CVSS 7.1 · High EPSS 0.02% · P5
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-43616

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Detect-It-Easy < 3.21 Path Traversal Arbitrary File Write
Source: NVD (National Vulnerability Database)
Vulnerability Description
Detect-It-Easy prior to 3.21 contains a path traversal vulnerability that allows attackers to write arbitrary files to the filesystem by crafting malicious archive entries with relative traversal sequences or absolute paths. Attackers can exploit insufficient path normalization during archive extraction to write files outside the intended extraction directory and achieve persistent code execution by overwriting user startup scripts.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
相对路径遍历
Source: NVD (National Vulnerability Database)
Vulnerability Title
DIE-engine 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
DIE-engine是Hors个人开发者的一个文件类型检测与逆向分析工具。 DIE-engine 3.21之前版本存在安全漏洞,该漏洞源于路径遍历,可能导致攻击者通过制作包含相对遍历序列或绝对路径的恶意存档条目将任意文件写入文件系统,利用存档提取期间路径规范化不足将文件写入预期提取目录之外,并通过覆盖用户启动脚本实现持久代码执行。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
horsicqDIE-engine 0 ~ 3.21.0 -

II. Public POCs for CVE-2026-43616

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-43616

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2026-43616

No comments yet


Leave a comment