Логотип exploitDog
bind:CVE-2025-52577
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-52577

Количество 3

Количество 3

nvd логотип

CVE-2025-52577

около 1 месяца назад

A vulnerability exists in Advantech iView that could allow SQL injection and remote code execution through NetworkServlet.archiveTrapRange(). This issue requires an authenticated attacker with at least user-level privileges. Certain input parameters are not properly sanitized, allowing an attacker to perform SQL injection and potentially execute code in the context of the 'nt authority\local service' account.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-5fv5-hvwx-g2h9

около 1 месяца назад

A vulnerability exists in Advantech iView that could allow SQL injection and remote code execution through NetworkServlet.archiveTrapRange(). This issue requires an authenticated attacker with at least user-level privileges. Certain input parameters are not properly sanitized, allowing an attacker to perform SQL injection and potentially execute code in the context of the 'nt authority\local service' account.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2025-08967

2 месяца назад

Уязвимость функции NetworkServlet.archiveTrapRange() системы централизованного управления сетевыми устройствами и портами Advantech iView, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-52577

A vulnerability exists in Advantech iView that could allow SQL injection and remote code execution through NetworkServlet.archiveTrapRange(). This issue requires an authenticated attacker with at least user-level privileges. Certain input parameters are not properly sanitized, allowing an attacker to perform SQL injection and potentially execute code in the context of the 'nt authority\local service' account.

CVSS3: 8.8
0%
Низкий
около 1 месяца назад
github логотип
GHSA-5fv5-hvwx-g2h9

A vulnerability exists in Advantech iView that could allow SQL injection and remote code execution through NetworkServlet.archiveTrapRange(). This issue requires an authenticated attacker with at least user-level privileges. Certain input parameters are not properly sanitized, allowing an attacker to perform SQL injection and potentially execute code in the context of the 'nt authority\local service' account.

CVSS3: 8.8
0%
Низкий
около 1 месяца назад
fstec логотип
BDU:2025-08967

Уязвимость функции NetworkServlet.archiveTrapRange() системы централизованного управления сетевыми устройствами и портами Advantech iView, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
0%
Низкий
2 месяца назад

Уязвимостей на страницу