Логотип exploitDog
bind:CVE-2025-53475
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-53475

Количество 3

Количество 3

nvd логотип

CVE-2025-53475

около 1 месяца назад

A vulnerability exists in Advantech iView that could allow for SQL injection and remote code execution through NetworkServlet.getNextTrapPage(). This issue requires an authenticated attacker with at least user-level privileges. Certain parameters in this function are not properly sanitized, allowing an attacker to perform SQL injection and potentially execute code in the context of the 'nt authority\local service' account.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-p75w-2vvm-8gvr

около 1 месяца назад

A vulnerability exists in Advantech iView that could allow for SQL injection and remote code execution through NetworkServlet.getNextTrapPage(). This issue requires an authenticated attacker with at least user-level privileges. Certain parameters in this function are not properly sanitized, allowing an attacker to perform SQL injection and potentially execute code in the context of the 'nt authority\local service' account.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2025-08968

2 месяца назад

Уязвимость функции NetworkServlet.getNextTrapPage() системы централизованного управления сетевыми устройствами и портами Advantech iView, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-53475

A vulnerability exists in Advantech iView that could allow for SQL injection and remote code execution through NetworkServlet.getNextTrapPage(). This issue requires an authenticated attacker with at least user-level privileges. Certain parameters in this function are not properly sanitized, allowing an attacker to perform SQL injection and potentially execute code in the context of the 'nt authority\local service' account.

CVSS3: 8.8
0%
Низкий
около 1 месяца назад
github логотип
GHSA-p75w-2vvm-8gvr

A vulnerability exists in Advantech iView that could allow for SQL injection and remote code execution through NetworkServlet.getNextTrapPage(). This issue requires an authenticated attacker with at least user-level privileges. Certain parameters in this function are not properly sanitized, allowing an attacker to perform SQL injection and potentially execute code in the context of the 'nt authority\local service' account.

CVSS3: 8.8
0%
Низкий
около 1 месяца назад
fstec логотип
BDU:2025-08968

Уязвимость функции NetworkServlet.getNextTrapPage() системы централизованного управления сетевыми устройствами и портами Advantech iView, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
0%
Низкий
2 месяца назад

Уязвимостей на страницу