4 results (0.005 seconds)

CVSS: 9.8EPSS: 2%CPEs: 2EXPL: 1

A vulnerability has been found in Byzoro Smart S210 Management Platform up to 20240117 and classified as critical. This vulnerability affects unknown code of the file /Tool/uploadfile.php. The manipulation of the argument file_upload leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. • https://github.com/Yu1e/vuls/blob/main/an%20arbitrary%20file%20upload%20vulnerability%20in%20BaiZhuo%20Networks%20Smart%20S210%20multi-service%20security%20gateway%20intelligent%20management%20platform.md https://vuldb.com/?ctiid.252184 https://vuldb.com/?id.252184 https://vuldb.com/?submit.269268 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 1

A vulnerability classified as critical has been found in Byzoro S210 up to 20231210. Affected is an unknown function of the file /importexport.php. The manipulation of the argument sql leads to injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. • https://github.com/Stitch3612/cve/blob/main/rce.md https://vuldb.com/?ctiid.248688 https://vuldb.com/?id.248688 https://vuldb.com/?submit.250043 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 1

A vulnerability was found in Byzoro S210 up to 20231123. It has been declared as critical. This vulnerability affects unknown code of the file /Tool/uploadfile.php of the component HTTP POST Request Handler. The manipulation of the argument file_upload leads to unrestricted upload. The attack can be initiated remotely. • https://github.com/willchen0011/cve/blob/main/upload.md https://vuldb.com/?ctiid.247156 https://vuldb.com/?id.247156 https://vuldb.com/?submit.242777 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 1

A vulnerability was found in Byzoro S210 up to 20231121. It has been classified as critical. This affects an unknown part of the file /Tool/repair.php of the component HTTP POST Request Handler. The manipulation of the argument txt leads to sql injection. It is possible to initiate the attack remotely. • https://github.com/houhuidong/cve/blob/main/rce.md https://vuldb.com/?ctiid.247155 https://vuldb.com/?id.247155 https://vuldb.com/?submit.241692 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •