Tar Slip: Path Traversal in OTA Update Client CLI
A deep dive into a path traversal bug I found in an OTA update system’s artifact extraction process. The vulnerability bypasses the staged validation security model, allowing arbitrary file writes during updates. Due to the vendor’s bug bounty program rules prohibiting public disclosure, I’ll refer to the product as “OTAHub” throughout this writeup.
Table of Contents
Overview
I discovered a path traversal vulnerability in OTAHub’s update module that allows attackers to write arbitrary files anywhere on the target device’s filesystem during artifact extraction. The vulnerability bypasses OTAHub’s staged security model, which is designed to validate artifacts before they touch the production filesystem.

