Vulnerabilities
Vulnerable Software
Secheron:  Security Vulnerabilities
Controls limiting uploads to certain file extensions may be bypassed. This could allow an attacker to intercept the initial file upload page response and modify the associated code. This modified code can be forwarded and used by a script loaded later in the sequence, allowing for arbitrary file upload into a location where PHP scripts may be executed.
CVSS Score
9.4
EPSS Score
0.002
Published
2022-06-24
An attacker with weak credentials could access the TCP port via an open FTP port, allowing an attacker to read sensitive files and write to remotely executable directories.
CVSS Score
9.8
EPSS Score
0.002
Published
2022-06-24
The www-data (Apache web server) account is configured to run sudo with no password for many commands (including /bin/sh and /bin/bash).
CVSS Score
9.9
EPSS Score
0.002
Published
2022-06-24
Client-side JavaScript controls may be bypassed to change user credentials and permissions without authentication, including a “root” user level meant only for the vendor. Web server root level access allows for changing of safety critical parameters.
CVSS Score
9.4
EPSS Score
0.002
Published
2022-06-24
The default password for the web application’s root user (the vendor’s private account) was weak and the MD5 hash was used to crack the password using a widely available open-source tool.
CVSS Score
6.5
EPSS Score
0.001
Published
2022-06-24
Client-side JavaScript controls may be bypassed by directly running a JS function to reboot the PLC (e.g., from the browser console) or by loading the corresponding, browser accessible PHP script
CVSS Score
7.5
EPSS Score
0.002
Published
2022-06-24
Weak default root user credentials allow remote attackers to easily obtain OS superuser privileges over the open TCP port for SSH.
CVSS Score
9.8
EPSS Score
0.005
Published
2022-06-24


Contact Us

Shodan ® - All rights reserved