Vulnerabilities
Vulnerable Software
Mbconnectline:  Security Vulnerabilities
A high privileged remote attacker can exhaust critical system resources by sending specifically crafted POST requests to the send-mail action in fast succession.
CVSS Score
4.9
EPSS Score
0.002
Published
2025-07-21
A high privileged remote attacker can alter the configuration database via POST requests due to improper neutralization of special elements used in a SQL statement.
CVSS Score
6.5
EPSS Score
0.002
Published
2025-07-21
A high privileged remote attacker can execute arbitrary system commands via POST requests in the send_sms action due to improper neutralization of special elements used in an OS command.
CVSS Score
7.2
EPSS Score
0.002
Published
2025-07-21
An unauthenticated remote attacker can execute OS commands via UDP on the device due to missing authentication.
CVSS Score
9.8
EPSS Score
0.036
Published
2024-10-15
The devices contain two hard coded user accounts with hardcoded passwords that allow an unauthenticated remote attacker for full control of the affected devices.
CVSS Score
9.8
EPSS Score
0.034
Published
2024-10-15
An unauthenticated remote attacker can get read access to files in the "/tmp" directory due to missing authentication.
CVSS Score
7.5
EPSS Score
0.005
Published
2024-10-15
An unauthenticated local attacker can gain admin privileges by deploying a config file due to improper input validation.
CVSS Score
8.4
EPSS Score
0.001
Published
2024-10-15
An unauthenticated remote attacker can perform a brute-force attack on the credentials of the remote service portal with a high chance of success, resulting in connection lost.
CVSS Score
7.5
EPSS Score
0.01
Published
2024-10-15
An unauthenticated local attacker can decrypt the devices config file and therefore compromise the device due to a weak implementation of the encryption used.
CVSS Score
8.4
EPSS Score
0.001
Published
2024-10-15
In Red Lion Europe mbCONNECT24 and mymbCONNECT24 and Helmholz myREX24 and myREX24.virtual up to and including 2.14.2 an improperly implemented access validation allows an authenticated, low privileged attacker to gain read access to limited, non-critical device information in his account he should not have access to.
CVSS Score
4.3
EPSS Score
0.001
Published
2023-10-16


Contact Us

Shodan ® - All rights reserved