CVE-2026-30287
Published: 01 April 2026
Summary
CVE-2026-30287 is a high-severity External Control of File Name or Path (CWE-73) vulnerability in Deepthought.Industries Ace Scanner. Its CVSS base score is 8.4 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 2.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and AC-3 (Access Enforcement).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires validation of file inputs at the import process to ensure malicious files cannot overwrite critical internal files, directly addressing the core vulnerability mechanism.
Enforces access control policies that restrict unauthorized write operations to critical files during the import process.
Monitors integrity of software and critical files to detect unauthorized overwrites leading to code execution or information exposure.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Arbitrary file overwrite in client PDF scanner app directly enables exploitation for code execution (T1203) via malicious import; info exposure secondary but not mapped to specific technique.
NVD Description
An arbitrary file overwrite vulnerability in Deep Thought Industries ACE Scanner PDF Scanner v1.4.5 allows attackers to overwrite critical internal files via the file import process, leading to arbitrary code execution or information exposure.
Deeper analysisAI
CVE-2026-30287 is an arbitrary file overwrite vulnerability in Deep Thought Industries ACE Scanner PDF Scanner version 1.4.5. The issue arises during the file import process, where attackers can overwrite critical internal files, potentially leading to arbitrary code execution or information exposure. It is associated with CWE-73 and carries a CVSS v3.1 base score of 8.4 (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its impacts on confidentiality, integrity, and availability.
Local attackers with unprivileged access can exploit this vulnerability by supplying a malicious file through the import functionality. No user interaction or special privileges are required, and the attack complexity is low. Successful exploitation allows overwriting of critical files, enabling arbitrary code execution on the affected system or exposure of sensitive information.
Advisories and additional details are available from the vendor site at https://deepthought.industries/, a GitHub issue at https://github.com/Secsys-FDU/AF_CVEs/issues/16, the Google Play Store listing at https://play.google.com/store/apps/details?id=pdfscanner.scan.pdf.scanner.free, and Fudan University's security systems page at https://secsys.fudan.edu.cn/. The vulnerability was published on 2026-04-01T14:16:49.777.
Details
- CWE(s)