Логотип exploitDog
bind:CVE-2022-31808
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-31808

Количество 3

Количество 3

nvd логотип

CVE-2022-31808

почти 3 года назад

A vulnerability has been identified in SiPass integrated AC5102 (ACC-G2) (All versions < V2.85.44), SiPass integrated ACC-AP (All versions < V2.85.43). Affected devices improperly sanitize user input on the telnet command line interface. This could allow an authenticated user to escalate privileges by injecting arbitrary commands that are executed with root privileges.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-63hw-pp24-qp9g

почти 3 года назад

A vulnerability has been identified in SiPass integrated AC5102 (ACC-G2) (All versions < V2.85.44), SiPass integrated ACC-AP (All versions < V2.85.43). Affected devices improperly sanitize user input on the telnet command line interface. This could allow an authenticated user to escalate privileges by injecting arbitrary commands that are executed with root privileges.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2023-01187

почти 3 года назад

Уязвимость интерфейса командной строки интегрированных контроллеров IP-доступа SiPass, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-31808

A vulnerability has been identified in SiPass integrated AC5102 (ACC-G2) (All versions < V2.85.44), SiPass integrated ACC-AP (All versions < V2.85.43). Affected devices improperly sanitize user input on the telnet command line interface. This could allow an authenticated user to escalate privileges by injecting arbitrary commands that are executed with root privileges.

CVSS3: 7.8
0%
Низкий
почти 3 года назад
github логотип
GHSA-63hw-pp24-qp9g

A vulnerability has been identified in SiPass integrated AC5102 (ACC-G2) (All versions < V2.85.44), SiPass integrated ACC-AP (All versions < V2.85.43). Affected devices improperly sanitize user input on the telnet command line interface. This could allow an authenticated user to escalate privileges by injecting arbitrary commands that are executed with root privileges.

CVSS3: 7.8
0%
Низкий
почти 3 года назад
fstec логотип
BDU:2023-01187

Уязвимость интерфейса командной строки интегрированных контроллеров IP-доступа SiPass, позволяющая нарушителю выполнить произвольный код

CVSS3: 7.8
0%
Низкий
почти 3 года назад

Уязвимостей на страницу