Vulnerabilities
Vulnerable Software
Security Vulnerabilities - CVEs Published In September 2021
There is command injection in the addMeshNode interface of xqnetwork.lua, which leads to command execution under administrator authority on Xiaomi router AX3600 with rom versionrom< 1.1.12
CVSS Score
9.8
EPSS Score
0.037
Published
2021-09-16
There is a buffer overflow in librsa.so called by getwifipwdurl interface, resulting in code execution on Xiaomi router AX3600 with ROM version =rom< 1.1.12.
CVSS Score
9.8
EPSS Score
0.007
Published
2021-09-16
Multiple Wireless M-Bus devices by Enbra use Hard-coded Credentials in Security mode 5 without an option to change the encryption key. An adversary can learn all information that is available in Enbra EWM.
CVSS Score
6.5
EPSS Score
0.0
Published
2021-09-16
Enbra EWM 1.7.29 does not check for or detect replay attacks sent by wireless M-Bus Security mode 5 devices. Instead timestamps of the sensor are replaced by the time of the readout even if the data is a replay of earlier data.
CVSS Score
6.5
EPSS Score
0.0
Published
2021-09-16
In Enbra EWM in Version 1.7.29 together with several tested wireless M-Bus Sensors the events backflow and "no flow" are not reconized or misinterpreted. This may lead to wrong values and missing events.
CVSS Score
6.2
EPSS Score
0.001
Published
2021-09-16
In Kaden PICOFLUX Air in all known versions an information exposure through observable discrepancy exists. This may give sensitive information (water consumption without distinct values) to third parties.
CVSS Score
4.3
EPSS Score
0.002
Published
2021-09-16
There is command injection in the meshd program in the routing system, resulting in command execution under administrator authority on Xiaomi router AX3600 with ROM version =< 1.1.12
CVSS Score
7.2
EPSS Score
0.01
Published
2021-09-16
Some js interfaces in the Xiaomi community were exposed, causing sensitive functions to be maliciously called on Xiaomi community app Affected Version <3.0.210809
CVSS Score
5.3
EPSS Score
0.002
Published
2021-09-16
The access controls on the Mobility read-only API improperly validate user access permissions. Attackers with both network access to the API and valid credentials can read data from it; regardless of access control group membership settings. This vulnerability is fixed in Mobility v11.76 and Mobility v12.14.
CVSS Score
5.3
EPSS Score
0.002
Published
2021-09-16
The access controls on the Mobility read-write API improperly validate user access permissions; this API is disabled by default. If the API is manually enabled, attackers with both network access to the API and valid credentials can read and write data to it; regardless of access control group membership settings. This vulnerability is fixed in Mobility v12.14.
CVSS Score
6.8
EPSS Score
0.002
Published
2021-09-16


Contact Us

Shodan ® - All rights reserved