Vulnerabilities
Vulnerable Software
Piigab:  >> M-Bus 900s Firmware  Security Vulnerabilities
PiiGAB M-Bus does not validate identification strings before processing, which could make it vulnerable to cross-site scripting attacks.
CVSS Score
8.0
EPSS Score
0.001
Published
2023-07-07
PiiGAB M-Bus stores passwords using a weak hash algorithm.
CVSS Score
7.5
EPSS Score
0.001
Published
2023-07-07
There are no requirements for setting a complex password for PiiGAB M-Bus, which could contribute to a successful brute force attack if the password is inline with recommended password guidelines.
CVSS Score
7.5
EPSS Score
0.001
Published
2023-07-07
PiiGAB M-Bus is vulnerable to cross-site request forgery. An attacker who wants to execute a certain command could send a phishing mail to the owner of the device and hope that the owner clicks on the link. If the owner of the device has a cookie stored that allows the owner to be logged in, then the device could execute the GET or POST link request.
CVSS Score
8.8
EPSS Score
0.001
Published
2023-07-07
PiiGAB M-Bus stores credentials in a plaintext file, which could allow a low-level user to gain admin credentials.
CVSS Score
6.5
EPSS Score
0.001
Published
2023-07-07
PiiGAB M-Bus transmits credentials in plaintext format.
CVSS Score
7.5
EPSS Score
0.001
Published
2023-07-06
The number of login attempts is not limited. This could allow an attacker to perform a brute force on HTTP basic authentication.
CVSS Score
5.9
EPSS Score
0.0
Published
2023-07-06
PiiGAB M-Bus contains hard-coded credentials which it uses for authentication.
CVSS Score
9.8
EPSS Score
0.001
Published
2023-07-06
PiiGAB M-Bus SoftwarePack 900S does not correctly sanitize user input, which could allow an attacker to inject arbitrary commands.
CVSS Score
8.8
EPSS Score
0.001
Published
2023-07-06


Contact Us

Shodan ® - All rights reserved