Cyber Posture

CVE-2026-30287

HighPublic PoC

Published: 01 April 2026

Published
01 April 2026
Modified
02 April 2026
KEV Added
Patch
CVSS Score 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0001 2.1th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-30287 is a high-severity External Control of File Name or Path (CWE-73) vulnerability in Deepthought.Industries Ace Scanner. Its CVSS base score is 8.4 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 2.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and AC-3 (Access Enforcement).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires validation of file inputs at the import process to ensure malicious files cannot overwrite critical internal files, directly addressing the core vulnerability mechanism.

prevent

Enforces access control policies that restrict unauthorized write operations to critical files during the import process.

detect

Monitors integrity of software and critical files to detect unauthorized overwrites leading to code execution or information exposure.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

Arbitrary file overwrite in client PDF scanner app directly enables exploitation for code execution (T1203) via malicious import; info exposure secondary but not mapped to specific technique.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

An arbitrary file overwrite vulnerability in Deep Thought Industries ACE Scanner PDF Scanner v1.4.5 allows attackers to overwrite critical internal files via the file import process, leading to arbitrary code execution or information exposure.

Deeper analysisAI

CVE-2026-30287 is an arbitrary file overwrite vulnerability in Deep Thought Industries ACE Scanner PDF Scanner version 1.4.5. The issue arises during the file import process, where attackers can overwrite critical internal files, potentially leading to arbitrary code execution or information exposure. It is associated with CWE-73 and carries a CVSS v3.1 base score of 8.4 (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its impacts on confidentiality, integrity, and availability.

Local attackers with unprivileged access can exploit this vulnerability by supplying a malicious file through the import functionality. No user interaction or special privileges are required, and the attack complexity is low. Successful exploitation allows overwriting of critical files, enabling arbitrary code execution on the affected system or exposure of sensitive information.

Advisories and additional details are available from the vendor site at https://deepthought.industries/, a GitHub issue at https://github.com/Secsys-FDU/AF_CVEs/issues/16, the Google Play Store listing at https://play.google.com/store/apps/details?id=pdfscanner.scan.pdf.scanner.free, and Fudan University's security systems page at https://secsys.fudan.edu.cn/. The vulnerability was published on 2026-04-01T14:16:49.777.

Details

CWE(s)

Affected Products

deepthought.industries
ace scanner
1.4.5

CVEs Like This One

CVE-2026-30292Shared CWE-73
CVE-2026-35465Shared CWE-73
CVE-2026-30289Shared CWE-73
CVE-2026-30291Shared CWE-73
CVE-2026-30284Shared CWE-73
CVE-2026-28442Shared CWE-73
CVE-2025-66254Shared CWE-73
CVE-2025-25761Shared CWE-73
CVE-2026-25605Shared CWE-73
CVE-2026-26360Shared CWE-73

References