Show filters
80 Total Results
Displaying 1-10 of 80
Sort by:
Attacker Value
Unknown

CVE-2025-0593

Disclosure Date: February 14, 2025 (last updated February 15, 2025)
The vulnerability may allow a remote low priviledged attacker to run arbitrary shell commands by using lower-level functions to interact with the device.
0
Attacker Value
Unknown

CVE-2025-0592

Disclosure Date: February 14, 2025 (last updated February 15, 2025)
The vulnerability may allow a remote low priviledged attacker to run arbitrary shell commands by manipulating the firmware file and uploading it to the device.
0
Attacker Value
Unknown

CVE-2025-0867

Disclosure Date: February 14, 2025 (last updated February 15, 2025)
The standard user uses the run as function to start the MEAC applications with administrative privileges. To ensure that the system can startup on its own, the credentials of the administrator were stored. Consequently, the EPC2 user can execute any command with administrative privileges. This allows a privilege escalation to the administrative level.
0
Attacker Value
Unknown

CVE-2024-53995

Disclosure Date: January 08, 2025 (last updated January 09, 2025)
SickChill is an automatic video library manager for TV shows. A user-controlled `login` endpoint's `next_` parameter takes arbitrary content. Prior to commit c7128a8946c3701df95c285810eb75b2de18bf82, an authenticated attacker may use this to redirect the user to arbitrary destinations, leading to open redirect. Commit c7128a8946c3701df95c285810eb75b2de18bf82 changes the login page to redirect to `settings.DEFAULT_PAGE` instead of to the `next` parameter.
0
Attacker Value
Unknown

CVE-2024-11022

Disclosure Date: December 06, 2024 (last updated December 21, 2024)
The authentication process to the web server uses a challenge response procedure which inludes the nonce and additional information. This challenge can be used several times for login and is therefore vulnerable for a replay attack.
0
Attacker Value
Unknown

CVE-2024-10776

Disclosure Date: December 06, 2024 (last updated December 21, 2024)
Lua apps can be deployed, removed, started, reloaded or stopped without authorization via AppManager. This allows an attacker to remove legitimate apps creating a DoS attack, read and write files or load apps that use all features of the product available to a customer.
0
Attacker Value
Unknown

CVE-2024-10774

Disclosure Date: December 06, 2024 (last updated December 21, 2024)
Unauthenticated CROWN APIs allow access to critical functions. This leads to the accessibility of large parts of the web application without authentication.
0
Attacker Value
Unknown

CVE-2024-10773

Disclosure Date: December 06, 2024 (last updated December 21, 2024)
The product is vulnerable to pass-the-hash attacks in combination with hardcoded credentials of hidden user levels. This means that an attacker can log in with the hidden user levels and gain full access to the device.
0
Attacker Value
Unknown

CVE-2024-10772

Disclosure Date: December 06, 2024 (last updated December 21, 2024)
Since the firmware update is not validated, an attacker can install modified firmware on the device. This has a high impact on the availabilty, integrity and confidentiality up to the complete compromise of the device.
0
Attacker Value
Unknown

CVE-2024-10771

Disclosure Date: December 06, 2024 (last updated December 21, 2024)
Due to missing input validation during one step of the firmware update process, the product is vulnerable to remote code execution. With network access and the user level ”Service”, an attacker can execute arbitrary system commands in the root user’s contexts.
0