Show filters
43 Total Results
Displaying 1-10 of 43
Sort by:
Attacker Value
Very High

CVE-2014-6271

Disclosure Date: September 24, 2014 (last updated July 25, 2024)
GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.
Attacker Value
Unknown

CVE-2024-11497

Disclosure Date: January 14, 2025 (last updated January 15, 2025)
An authenticated attacker can use this vulnerability to perform a privilege escalation to gain root access.
Attacker Value
Unknown

CVE-2024-6788

Disclosure Date: August 13, 2024 (last updated January 24, 2025)
A remote unauthenticated attacker can use the firmware update feature on the LAN interface of the device to reset the password for the predefined, low-privileged user “user-app” to the default password.
Attacker Value
Unknown

CVE-2024-3913

Disclosure Date: August 13, 2024 (last updated January 29, 2025)
An unauthenticated remote attacker can use this vulnerability to change the device configuration due to a file writeable for short time after system startup.
Attacker Value
Unknown

CVE-2024-28137

Disclosure Date: May 14, 2024 (last updated January 24, 2025)
A local attacker with low privileges can perform a privilege escalation with an init script due to a TOCTOU vulnerability.
0
Attacker Value
Unknown

CVE-2024-28136

Disclosure Date: May 14, 2024 (last updated January 24, 2025)
A local attacker with low privileges can use a command injection vulnerability to gain root privileges due to improper input validation using the OCPP Remote service.
0
Attacker Value
Unknown

CVE-2024-28135

Disclosure Date: May 14, 2024 (last updated January 24, 2025)
A low privileged remote attacker can use a command injection vulnerability in the API which performs remote code execution as the user-app user due to improper input validation. The confidentiality is partly affected.
0
Attacker Value
Unknown

CVE-2024-28134

Disclosure Date: May 14, 2024 (last updated January 24, 2025)
An unauthenticated remote attacker can extract a session token with a MitM attack and gain web-based management access with the privileges of the currently logged in user due to cleartext transmission of sensitive information. No additional user interaction is required. The access is limited as only non-sensitive information can be obtained but the availability can be seriously affected. 
0
Attacker Value
Unknown

CVE-2024-28133

Disclosure Date: May 14, 2024 (last updated January 24, 2025)
A local low privileged attacker can use an untrusted search path in a CHARX system utility to gain root privileges. 
0
Attacker Value
Unknown

CVE-2024-26288

Disclosure Date: March 12, 2024 (last updated January 24, 2025)
An unauthenticated remote attacker can influence the communication due to the lack of encryption of sensitive data via a MITM. Charging is not affected.
0