Vulnerabilities
Vulnerable Software
Wut:  >> Com-Server Highspeed Compact  Security Vulnerabilities
Multiple Wiesemann&Theis products of the ComServer Series are prone to an authentication bypass through IP spoofing. After a user logged in to the WBM of the Com-Server an unauthenticated attacker in the same subnet can obtain the session ID and through IP spoofing change arbitrary settings by crafting modified HTTP Get requests. This may result in a complete takeover of the device.
CVSS Score
8.0
EPSS Score
0.0
Published
2022-12-13
Multiple W&T products of the ComServer Series are prone to an authentication bypass. An unathenticated remote attacker, can log in without knowledge of the password by crafting a modified HTTP GET Request.
CVSS Score
9.8
EPSS Score
0.005
Published
2022-11-15
Multiple W&T Products of the ComServer Series are prone to an XSS attack. An authenticated remote Attacker can execute arbitrary web scripts or HTML via a crafted payload injected into the title of the configuration webpage
CVSS Score
5.4
EPSS Score
0.001
Published
2022-11-10
Multiple W&T products of the Comserver Series use a small number space for allocating sessions ids. After login of an user an unathenticated remote attacker can brute force the users session id and get access to his account on the the device. As the user needs to log in for the attack to be successful a user interaction is required.
CVSS Score
8.8
EPSS Score
0.016
Published
2022-11-10


Contact Us

Shodan ® - All rights reserved