VYPR
Medium severity6.5NVD Advisory· Published Feb 1, 2026· Updated Apr 15, 2026

CVE-2022-50950

CVE-2022-50950

Description

Webile 1.0.1 contains a directory traversal vulnerability that allows remote attackers to manipulate file system paths without authentication. Attackers can exploit path manipulation to access sensitive system directories and potentially compromise the mobile device's local file system.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Webile 1.0.1 contains a directory traversal vulnerability allowing unauthenticated remote attackers to read arbitrary files on the host device's filesystem.

Vulnerability

Overview

Webile 1.0.1, a local area network file management tool that runs a web server on a mobile device, is vulnerable to a directory traversal attack. The application fails to properly validate user-supplied paths in HTTP requests, enabling an attacker to escape the intended document root and access arbitrary directories and files on the device's filesystem. [1][3]

Exploitation

The vulnerability can be exploited remotely without any authentication, as the web interface is directly exposed to the local network. An attacker sends specially crafted requests containing path traversal sequences (e.g., ../) to manipulate file system paths and navigate outside the application's designated directory. The attack requires network access to the Webile service. [1]

Impact

Successful exploitation allows an attacker to read sensitive system files, configuration data, or any user-accessible content stored on the mobile device. This could include private documents, media files, or system credentials, leading to further compromise of the device or user privacy. The CVSS v3 base score is 6.5 (Medium), with the attack vector being network-based and requiring no privileges. [3]

Mitigation

At the time of disclosure, a vendor patch was reportedly developed. Users are advised to update Webile to the latest version available from the Google Play Store. As a workaround, restricting network access to the Webile service via firewall rules can reduce exposure. [1]

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.