HomeTelegramCVE-2017-17715

CVE-2017-17715

HIGH
8.8CVSS
Published: 2017-12-16
Updated: 2025-04-20
AI Analysis

Description

The saveFile method in MediaController.java in the Telegram Messenger application before 2017-12-08 for Android allows directory traversal via a pathname obtained in a file-transfer request from a remote peer, as demonstrated by writing to tgnet.dat or tgnet.dat.bak.

CVSS Metrics

Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
network
Complexity
low
Privileges
none
User Action
required
Scope
unchanged
Confidentiality
high
Integrity
high
Availability
high
Weaknesses
CWE-22

Metadata

Primary Vendor
TELEGRAM
Published
12/16/2017
Last Modified
4/20/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

telegram : telegram_messenger

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2017-17715 | HIGH Severity | CVEDatabase.com | CVEDatabase.com