9 results (0.022 seconds)

CVSS: 5.4EPSS: 0%CPEs: 2EXPL: 2

A vulnerability in Solar-Log Base 15 Firmware 6.0.1 Build 161, and possibly other Solar-Log Base products, allows an attacker to escalate their privileges by exploiting a stored cross-site scripting (XSS) vulnerability in the switch group function under /#ilang=DE&b=c_smartenergy_swgroups in the web portal. The vulnerability can be exploited to gain the rights of an installer or PM, which can then be used to gain administrative access to the web portal and execute further attacks. Una vulnerabilidad en Solar-Log Base 15 Firmware 6.0.1 Build 161, y posiblemente en otros productos Solar-Log Base, permite a un atacante escalar sus privilegios explotando una vulnerabilidad de cross-site scripting (XSS) almacenada en la función de grupo de conmutadores en / #ilang=DE&b=c_smartenergy_swgroups en el portal web. La vulnerabilidad se puede aprovechar para obtener los derechos de un instalador o PM, que luego se puede utilizar para obtener acceso administrativo al portal web y ejecutar más ataques. A vulnerability in Solar-Log Base 15 Firmware 6.0.1 Build 161, and possibly other Solar-Log Base products, allows an attacker to escalate their privileges by exploiting a stored cross-site scripting (XSS) vulnerability in the switch group function under /#ilang=DE&b=c_smartenergy_swgroups in the web portal. • https://github.com/vinnie1717/CVE-2023-46344 http://solar-log.com https://github.com/vinnie1717/CVE-2023-46344/blob/main/Solar-Log%20XSS https://www.solar-log.com/en/support/firmware-database-1 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 0%CPEs: 30EXPL: 1

A backdoor in Solar-Log Gateway products allows remote access via web panel gaining super administration privileges to the attacker. This affects all Solar-Log devices that use firmware version v4.2.7 up to v5.1.1 (included). Una puerta trasera en los productos Solar-Log Gateway permite el acceso remoto a través de un panel web, obteniendo privilegios de superadministración para el atacante. Esto afecta a todos los dispositivos Solar-Log que utilizan la versión de firmware v4.2.7 hasta v5.1.1 (incluida). A backdoor in Solar-Log Gateway products allows remote access via web panel gaining super administration privileges to the attacker. • https://www.solar-log.com/en/support/firmware-database-1 https://www.swascan.com/security-advisory-solar-log •

CVSS: 9.8EPSS: 0%CPEs: 24EXPL: 1

A vulnerability was found in Solare Solar-Log 2.8.4-56/3.5.2-85. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Flash Memory. The manipulation leads to privilege escalation. The attack can be launched remotely. • http://seclists.org/fulldisclosure/2017/Mar/58 https://vuldb.com/?id.98935 • CWE-269: Improper Privilege Management •

CVSS: 7.5EPSS: 0%CPEs: 24EXPL: 1

A vulnerability was found in Solare Solar-Log 2.8.4-56/3.5.2-85. It has been classified as problematic. Affected is an unknown function. The manipulation leads to denial of service. It is possible to launch the attack remotely. • http://seclists.org/fulldisclosure/2017/Mar/58 https://vuldb.com/?id.98934 • CWE-404: Improper Resource Shutdown or Release •

CVSS: 9.8EPSS: 0%CPEs: 24EXPL: 1

A vulnerability was found in Solare Solar-Log 2.8.4-56/3.5.2-85 and classified as critical. This issue affects some unknown processing of the component Network Config. The manipulation leads to privilege escalation. The attack may be initiated remotely. Upgrading to version 3.5.3-86 is able to address this issue. • http://seclists.org/fulldisclosure/2017/Mar/58 https://vuldb.com/?id.98933 • CWE-269: Improper Privilege Management •