CVE-2026-30277
Published: 31 March 2026
Summary
CVE-2026-30277 is a high-severity Path Traversal (CWE-22) vulnerability in Triumph-Adler Mobile Print. Its CVSS base score is 8.4 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 7.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents exploitation by requiring validation of file inputs during the import process to block malicious files enabling arbitrary overwrites of critical internal files.
Mitigates the specific flaw in TA/UTAX Mobile Print v3.7.2.251001 by identifying, prioritizing, and remediating the arbitrary file overwrite vulnerability.
Verifies the integrity of critical internal files to prevent execution of overwritten code or detect unauthorized modifications post-import.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Arbitrary file overwrite (path traversal) in a client PDF app directly enables local exploitation for code execution (T1203) and associated privilege escalation (T1068) by overwriting internal binaries/configs during import with no user interaction or privileges required.
NVD Description
An arbitrary file overwrite vulnerability in PDF Reader App : TA/UTAX Mobile Print v3.7.2.251001 allows attackers to overwrite critical internal files via the file import process, leading to arbitrary code execution or information exposure.
Deeper analysisAI
CVE-2026-30277 is an arbitrary file overwrite vulnerability, classified under CWE-22, affecting the PDF Reader App within TA/UTAX Mobile Print version 3.7.2.251001. The flaw enables attackers to overwrite critical internal files during the file import process, which can result in arbitrary code execution or information exposure. Published on 2026-03-31, it carries a CVSS v3.1 base score of 8.4 (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact with relatively low barriers to exploitation.
A local attacker can exploit this vulnerability with low complexity and no required privileges or user interaction. By crafting a malicious file for import, the attacker overwrites essential internal files, achieving high levels of confidentiality, integrity, and availability disruption, such as executing arbitrary code on the affected system or exposing sensitive data.
Advisories and additional details are available in the following references: http://pdf.com, https://github.com/Secsys-FDU/AF_CVEs/issues/24, https://secsys.fudan.edu.cn/, and https://www.triumph-adler.com/ta-de-de/software/mobile-und-cloud/mobile-print.
Details
- CWE(s)