Vulnerabilities
Vulnerable Software
Kerlink:  >> Keros  Security Vulnerabilities
Kerlink gateways running KerOS prior to version 5.10 expose their web interface exclusively over HTTP, without HTTPS support. This lack of transport layer security allows a man-in-the-middle attacker to intercept and modify traffic between the client and the device.
CVSS Score
6.8
EPSS Score
0.0
Published
2025-12-01
Due to a firewall misconfiguration, Kerlink devices running KerOS prior to 5.12 incorrectly accept specially crafted UDP packets. This allows an attacker to bypass the firewall and access UDP-based services that would otherwise be protected.
CVSS Score
5.3
EPSS Score
0.0
Published
2025-12-01
The service wmp-agent of KerOS prior 5.12 does not properly validate so-called ‘magic URLs’ allowing an unauthenticated remote attacker to execute arbitrary OS commands as root when the service is reachable over network. Typically, the service is protected via local firewall.
CVSS Score
8.1
EPSS Score
0.001
Published
2025-12-01


Contact Us

Shodan ® - All rights reserved