Advantech EKI-122x-BE devices with firmware before 1.65, EKI-132x devices with firmware before 1.98, and EKI-136x devices with firmware before 1.27 have hardcoded SSH keys, which makes it easier for remote attackers to obtain access via an SSH session.
Multiple stack-based buffer overflows in unspecified DLL files in Advantech WebAccess before 8.0.1 allow remote attackers to execute arbitrary code via unknown vectors.
Buffer overflow on Advantech EKI-1200 gateways with firmware before 1.63 allows remote attackers to execute arbitrary code via unspecified vectors.
Buffer overflow in an ActiveX control in bwocxrun.ocx in Advantech/BroadWin WebAccess before 7.0 allows remote attackers to execute arbitrary code by leveraging the ability to write arbitrary content to any pathname.
Format string vulnerability in Advantech/BroadWin WebAccess before 7.0 allows remote attackers to execute arbitrary code via format string specifiers in a message string.
GbScriptAddUp.asp in Advantech/BroadWin WebAccess before 7.0 does not properly perform authentication, which allows remote attackers to execute arbitrary code via unspecified vectors.
Stack-based buffer overflow in opcImg.asp in Advantech/BroadWin WebAccess before 7.0 allows remote attackers to execute arbitrary code via unspecified vectors.
Buffer overflow in an ActiveX control in Advantech/BroadWin WebAccess before 7.0 might allow remote attackers to execute arbitrary code via a long string value in unspecified parameters.
Advantech/BroadWin WebAccess before 7.0 allows remote attackers to trigger the extraction of arbitrary web content into a batch file on a client system, and execute this batch file, via unspecified vectors.
Buffer overflow in Advantech/BroadWin WebAccess before 7.0 allows remote attackers to execute arbitrary code via a long string value in unspecified parameters.
Buffer overflow in the Advantech ADAM OLE for Process Control (OPC) Server ActiveX control in ADAM OPC Server before 3.01.012, Modbus RTU OPC Server before 3.01.010, and Modbus TCP OPC Server before 3.01.010 allows remote attackers to execute arbitrary code via unspecified vectors.
webvrpcs.exe in Advantech/BroadWin WebAccess allows remote attackers to execute arbitrary code or obtain a security-code value via a long string in an RPC request to TCP port 4592.
Stack-based buffer overflow in NTWebServer.exe in the test web service in InduSoft NTWebServer, as distributed in Advantech Studio 6.1 and InduSoft Web Studio 7.0, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long request to TCP port 80.
The Advantech ADAM-6000 module has 00000000 as its default password, which makes it easier for remote attackers to obtain access through an HTTP session, and (1) monitor or (2) control the module's Modbus/TCP I/O activity.
Multiple buffer overflows in the ISSymbol ActiveX control in ISSymbol.ocx 61.6.0.0 and 301.1009.2904.0 in the ISSymbol virtual machine, as distributed in Advantech Studio 6.1 SP6 61.6.01.05, InduSoft Web Studio before 7.0+SP1, and InduSoft Thin Client 7.0, allow remote attackers to execute arbitrary code via a long (1) InternationalOrder, (2) InternationalSeparator, or (3) LogFileName property value; or (4) a long bstrFileName argument to the OpenScreen method.
cgi/utility.cgi in Advantech EKI-6340 2.05 Wi-Fi Mesh Access Point allows remote authenticated users to execute arbitrary commands via shell metacharacters in the pinghost parameter to ping.cgi.
upAdminPg.asp in Advantech WebAccess before 7.2 allows remote authenticated users to discover credentials by reading HTML source code.
Advantech WebAccess/SCADA is vulnerable to unrestricted file upload, which may allow an attacker to remotely execute arbitrary code.
A vulnerability exists in Advantech iView that allows for SQL injection and remote code execution through NetworkServlet.archiveTrap(). This issue requires an authenticated attacker with at least user-level privileges. Certain input parameters are not sanitized, allowing an attacker to perform SQL injection and potentially execute code in the context of the 'nt authority\local service' account.
A vulnerability exists in Advantech iView that could allow for SQL injection and remote code execution through NetworkServlet.getNextTrapPage(). This issue requires an authenticated attacker with at least user-level privileges. Certain parameters in this function are not properly sanitized, allowing an attacker to perform SQL injection and potentially execute code in the context of the 'nt authority\local service' account.
A vulnerability exists in Advantech iView that could allow SQL injection and remote code execution through NetworkServlet.archiveTrapRange(). This issue requires an authenticated attacker with at least user-level privileges. Certain input parameters are not properly sanitized, allowing an attacker to perform SQL injection and potentially execute code in the context of the 'nt authority\local service' account.
Advantech ADAM 5550's web application includes a "logs" page where all the HTTP requests received are displayed to the user. The device doesn't correctly neutralize malicious code when parsing HTTP requests to generate page output.
An authenticated SQL injection vulnerability exists in Advantech iView versions prior to v5.7.4 build 6752. An authenticated remote attacker can bypass checks in com.imc.iview.utils.CUtils.checkSQLInjection() to perform blind SQL injection.
Advantech R-SeeNet versions 2.4.22 allows low-level users to access and load the content of local files.
Advantech EKI-1524, EKI-1522, EKI-1521 devices through 1.21 are affected by a Stack-based Buffer Overflow vulnerability, which can be triggered by authenticated users via a crafted POST request.
Advantech EKI-1524, EKI-1522, EKI-1521 devices through 1.21 are affected by an command injection vulnerability in the device name input field, which can be triggered by authenticated users via a crafted POST request.
Advantech EKI-1524, EKI-1522, EKI-1521 devices through 1.21 are affected by an command injection vulnerability in the NTP server input field, which can be triggered by authenticated users via a crafted POST request.
A privilege escalation vulnerability exists in the installation of Advantech DeviceOn/iService 1.1.7. A specially-crafted file can be replaced in the system to escalate privileges to NT SYSTEM authority. An attacker can provide a malicious file to trigger this vulnerability.
A privilege escalation vulnerability exists in the installation of Advantech DeviceOn/iEdge Server 1.0.2. A specially-crafted file can be replaced in the system to escalate privileges to NT SYSTEM authority. An attacker can provide a malicious file to trigger this vulnerability.
A privilege escalation vulnerability exists in Advantech SQ Manager Server 1.0.6. A specially-crafted file can be replaced in the system to escalate privileges to NT SYSTEM authority. An attacker can provide a malicious file to trigger this vulnerability.
An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted HTTP request at '‘ord’ parameter. An attacker can make authenticated HTTP requests to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery.
An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted HTTP request at 'description_filter’ parameter. An attacker can make authenticated HTTP requests to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery.
An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted HTTP request at ‘company_filter’ parameter. An attacker can make authenticated HTTP requests to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery.
An exploitable local privilege elevation vulnerability exists in the file system permissions of Advantech WebAccess/SCADA 9.0.1 installation. In COM Server Application Privilege Escalation, an attacker can either replace binary or loaded modules to execute code with NT SYSTEM privilege.
An exploitable local privilege elevation vulnerability exists in the file system permissions of Advantech WebAccess/SCADA 9.0.1 installation. In webvrpcs Run Key Privilege Escalation in installation folder of WebAccess, an attacker can either replace binary or loaded modules to execute code with NT SYSTEM privilege.
An exploitable local privilege elevation vulnerability exists in the file system permissions of Advantech WebAccess/SCADA 9.0.1 installation. In privilege escalation via multiple service executables in installation folder of WebAccess, an attacker can either replace binary or loaded modules to execute code with NT SYSTEM privilege.
An exploitable local privilege elevation vulnerability exists in the file system permissions of Advantech WebAccess/SCADA 9.0.1 installation. In privilege escalation via PostgreSQL executable, an attacker can either replace binary or loaded modules to execute code with NT SYSTEM privilege.
Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple relative path traversal vulnerabilities exist that may allow a low privilege user to overwrite files outside the application’s control.
In Advantech WebAccess, Versions 8.4.2 and prior. A stack-based buffer overflow vulnerability caused by a lack of proper validation of the length of user-supplied data may allow remote code execution.
In Advantech WebAccess HMI Designer Version 2.1.9.23 and prior, processing specially crafted MCR files lacking proper validation of user supplied data may cause the system to write outside the intended buffer area, allowing remote code execution.
Advantech WebAccess 8.3.2 and below is vulnerable to a stack buffer overflow vulnerability. A remote authenticated attacker could potentially exploit this vulnerability by sending a crafted HTTP request to broadweb/system/opcImg.asp.
A heap-based buffer overflow issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. Researchers have identified multiple vulnerabilities where there is a lack of proper validation of the length of user-supplied data prior to copying it to the heap-based buffer, which could allow an attacker to execute arbitrary code under the context of the process.
An Externally Controlled Format String issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. String format specifiers based on user provided input are not properly validated, which could allow an attacker to execute arbitrary code.
Cross-site request forgery (CSRF) vulnerability in Advantech WebAccess before 8.1 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.
Advantech WebAccess/SCADA is vulnerable to directory traversal, which may allow an attacker to delete arbitrary files.
Race condition in Advantech WebAccess before 8.1 allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow) via a crafted request.
Advantech WebAccess before 8.1 allows remote attackers to execute arbitrary code via vectors involving a browser plugin.
SQL injection vulnerability in Advantech WebAccess before 8.1 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors.
Cookies of authenticated Advantech ADAM-5630 users remain as active valid cookies when a session is closed. Forging requests with a legitimate cookie, even if the session was terminated, allows an unauthorized attacker to act with the same level of privileges of the legitimate user.
Advantech ADAM-5630 contains a cross-site request forgery (CSRF) vulnerability. It allows an attacker to partly circumvent the same origin policy, which is designed to prevent different websites from interfering with each other.
An Improper Access Control vulnerability in Advantech SUSI driver (susi.sys) allows attackers to read/write arbitrary memory, I/O ports, and MSRs, resulting in privilege escalation, arbitrary code execution, and information disclosure. This issue affects Advantech SUSI: 5.0.24335 and prior.
A privilege escalation vulnerability exists in the installation of Advantech WISE-PaaS/OTA Server 3.0.9. A specially-crafted file can be replaced in the system to escalate privileges to NT SYSTEM authority. An attacker can provide a malicious file to trigger this vulnerability.
A privilege escalation vulnerability exists in the Windows version of installation for Advantech R-SeeNet Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted file can be replaced in the system to escalate privileges to NT SYSTEM authority. An attacker can provide a malicious file to trigger this vulnerability.
A privilege escalation vulnerability exists in the Windows version of installation for Advantech R-SeeNet Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted file can be replaced in the system to escalate privileges to NT SYSTEM authority. An attacker can provide a malicious file to trigger this vulnerability.
A privilege escalation vulnerability exists in the Windows version of installation for Advantech R-SeeNet Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted file can be replaced in the system to escalate privileges to NT SYSTEM authority. An attacker can provide a malicious file to trigger this vulnerability.
An exploitable local privilege elevation vulnerability exists in the file system permissions of Advantech WebAccess/SCADA 9.0.1 installation. In webvrpcs Run Key Privilege Escalation in installation folder of WebAccess, an attacker can either replace binary or loaded modules to execute code with NT SYSTEM privilege.
Advantech WebAccess HMI Designer, Versions 2.1.9.31 and prior. Processing specially crafted project files lacking proper validation of user supplied data may cause a type confusion condition, which may allow remote code execution, disclosure/modification of information, or cause the application to crash.
Advantech WebAccess HMI Designer, Versions 2.1.9.31 and prior. A double free vulnerability caused by processing specially crafted project files may allow remote code execution, disclosure/modification of information, or cause the application to crash.
Advantech WebAccess HMI Designer, Versions 2.1.9.31 and prior. Processing specially crafted project files lacking proper validation of user supplied data may cause a stack-based buffer overflow, which may allow remote code execution, disclosure/modification of information, or cause the application to crash.
Advantech WebAccess HMI Designer, Versions 2.1.9.31 and prior. Processing specially crafted project files lacking proper validation of user supplied data may cause the system to write outside the intended buffer area, which may allow remote code execution, disclosure/modification of information, or cause the application to crash.
Advantech WebAccess HMI Designer, Versions 2.1.9.31 and prior. Multiple heap-based buffer overflow vulnerabilities may be exploited by opening specially crafted project files that may overflow the heap, which may allow remote code execution, disclosure/modification of information, or cause the application to crash.
Advantech WebAccess 8.3.1 and earlier has an improper privilege management vulnerability, which may allow an attacker to access those files and perform actions at a system administrator level.
In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, an improper privilege management vulnerability may allow an authenticated user to modify files when read access should only be given to the user.
Advantech WebAccess 8.1 and earlier contains a DLL hijacking vulnerability which may allow an attacker to run a malicious DLL file within the search path resulting in execution of arbitrary code.
Processing specially crafted .pm3 files in Advantech WebAccess HMI Designer 2.1.7.32 and prior may cause the system to write outside the intended buffer area and may allow remote code execution.
Double free vulnerabilities in Advantech WebAccess HMI Designer 2.1.7.32 and prior caused by processing specially crafted .pm3 files may allow remote code execution.
Heap-based buffer overflow vulnerabilities in Advantech WebAccess HMI Designer 2.1.7.32 and prior caused by processing specially crafted .pm3 files may allow remote code execution.
A Heap-Based Buffer Overflow issue was discovered in Advantech WebOP. A maliciously crafted project file may be able to trigger a heap-based buffer overflow, which may crash the process and allow an attacker to execute arbitrary code.
An Uncontrolled Search Path Element issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. A maliciously crafted dll file placed earlier in the search path may allow an attacker to execute code within the context of the application.
An Incorrect Permission Assignment for Critical Resource issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. Multiple files and folders with ACLs that affect other users are allowed to be modified by non-administrator accounts.
An Incorrect Privilege Assignment issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. A built-in user account has been granted a sensitive privilege that may allow a user to elevate to administrative privileges.
An issue was discovered in Advantech SUISAccess Server Version 3.0 and prior. The admin password is stored in the system and is encrypted with a static key hard-coded in the program. Attackers could reverse the admin account password for use.
Absolute path traversal vulnerability in NTWebServer.exe in Indusoft Studio 7.0 and earlier and Advantech Studio 7.0 and earlier allows remote attackers to read arbitrary files via a full pathname in an argument to the sub_401A90 CreateFileW function.
A local file inclusion vulnerability exists in the installation functionality of Advantech WebAccess/SCADA 9.0.1. A specially crafted application can lead to information disclosure. An attacker can send an authenticated HTTP request to trigger this vulnerability.
A vulnerability exists in Advantech iView that could allow for SQL injection through the CUtils.checkSQLInjection() function. This vulnerability can be exploited by an authenticated attacker with at least user-level privileges, potentially leading to information disclosure or a denial-of-service condition.
Advantech iView versions 5.7.05.7057 and prior do not properly sanitize SNMP v1 trap (Port 162) requests, which could allow an attacker to inject SQL commands.
Advantech iView versions prior to v5.7.04 build 6425 contain a vulnerability within the SNMP management tool that allows for remote attackers to bypass authentication checks and reach a SQL injection vulnerability within the ‘data’ parameter to the ‘NetworkServlet’ endpoint. Successful exploitation allows for the exfiltration of user data, included clear text passwords.
Advantech iView ConfigurationServlet SQL Injection Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech iView. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ConfigurationServlet servlet, which listens on TCP port 8080 by default. When parsing the column_value element, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-17863.
An SQL injection vulnerability in Advantech iView 5.7.04.6469. The specific flaw exists within the ConfigurationServlet endpoint, which listens on TCP port 8080 by default. An unauthenticated remote attacker can craft a special column_value parameter in the setConfiguration action to bypass checks in com.imc.iview.utils.CUtils.checkSQLInjection() to perform SQL injection. For example, the attacker can exploit the vulnerability to retrieve the iView admin password.
Advantech Spectre RT ERT351 Versions 5.1.3 and prior logins and passwords are transmitted in clear text form, which may allow an attacker to intercept the request.
Advantech iView versions prior to v5.7.03.6112 are vulnerable to directory traversal, which may allow an attacker to read sensitive files.
Advantech iView versions prior to v5.7.03.6112 are vulnerable to a SQL injection, which may allow an unauthorized attacker to disclose information.
Advantech iView, versions 5.6 and prior, has an improper access control vulnerability. Successful exploitation of this vulnerability may allow an attacker to obtain all user accounts credentials.
Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. An out-of-bounds vulnerability exists that may allow access to unauthorized data.
Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Input is not properly sanitized and may allow an attacker to inject SQL commands.
Advantech WebAccess 8.3.4 does not properly restrict an RPC call that allows unauthenticated, remote users to read files. An attacker can use this vulnerability to recover the administrator password.
Advantech WISE-PaaS/RMM, Versions 3.3.29 and prior. XXE vulnerabilities exist that may allow disclosure of sensitive data.
Advantech WebAccess/HMI Designer 2.1.9.31 has Exception Handler Chain corruption starting at Unknown Symbol @ 0x0000000000000000 called from ntdll!RtlRaiseStatus+0x00000000000000b4.
Advantech WebAccess/HMI Designer 2.1.9.31 has a User Mode Write AV starting at MSVCR90!memcpy+0x000000000000015c.
In Advantech WebAccess/HMI Designer 2.1.9.31, Data from a Faulting Address controls Code Flow starting at PM_V3!CTagInfoThreadBase::GetNICInfo+0x0000000000512918.
Advantech WebAccess 8.3.4 allows unauthenticated, remote attackers to delete arbitrary files via IOCTL 10005 RPC.
Advantech WebAccess/SCADA, Versions 8.3.5 and prior. An improper access control vulnerability may allow an attacker to cause a denial-of-service condition.
Advantech WebAccess 8.3.1 and earlier has a .dll component that is susceptible to external control of file name or path vulnerability, which may allow an arbitrary file deletion when processing.
In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, a path transversal vulnerability has been identified, which may allow an attacker to disclose sensitive information on the target.
In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, several SQL injection vulnerabilities have been identified, which may allow an attacker to disclose sensitive information from the host.
In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, an external control of file name or path vulnerability has been identified, which may allow an attacker to delete files.
In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, an information exposure vulnerability through directory listing has been identified, which may allow an attacker to find important files that are not normally visible.
An Unrestricted Upload Of File With Dangerous Type issue was discovered in Advantech WebAccess versions prior to 8.3. WebAccess allows a remote attacker to upload arbitrary files.
An Improper Input Validation issue was discovered in Advantech WebAccess versions prior to 8.3. WebAccess allows some inputs that may cause the program to crash.
An Untrusted Pointer Dereference issue was discovered in Advantech WebAccess versions prior to 8.3. There are multiple vulnerabilities that may allow an attacker to cause the program to use an invalid memory address, resulting in a program crash.
An Untrusted Pointer Dereference issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. A remote attacker is able to execute code to dereference a pointer within the program causing the application to become unavailable.
A SQL Injection issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. By submitting a specially crafted parameter, it is possible to inject arbitrary SQL statements that could allow an attacker to obtain sensitive information.
An issue was discovered in Advantech SUISAccess Server Version 3.0 and prior. An attacker could traverse the file system and extract files that can result in information disclosure.
Buffer overflow in the BwpAlarm subsystem in Advantech WebAccess before 8.1 allows remote attackers to cause a denial of service via a crafted RPC request.
Directory traversal vulnerability in Advantech WebAccess before 8.1 allows remote attackers to list arbitrary virtual-directory files via unspecified vectors.
Advantech WebAccess before 8.1 allows remote attackers to obtain sensitive information via crafted input.
Advantech WebAccess before 8.1 allows remote attackers to bypass an intended administrative requirement and obtain file or folder access via unspecified vectors.
Advantech WebAccess before 8.1 allows remote attackers to cause a denial of service (out-of-bounds memory access) via unspecified vectors.
Multiple stack-based buffer overflows in Advantech AdamView 4.3 and earlier allow remote attackers to execute arbitrary code via a crafted (1) display properties or (2) conditional bitmap parameter in a GNI file.
The BrowseFolder method in the bwocxrun ActiveX control in Advantech WebAccess before 7.2 allows remote attackers to read arbitrary files via a crafted call.
The ChkCookie subroutine in an ActiveX control in broadweb/include/gChkCook.asp in Advantech WebAccess before 7.2 allows remote attackers to read arbitrary files via a crafted call.
Multiple stack-based buffer overflows in Advantech WebAccess before 7.2 allow remote attackers to execute arbitrary code via a long string in the (1) ProjectName, (2) SetParameter, (3) NodeName, (4) CCDParameter, (5) SetColor, (6) AlarmImage, (7) GetParameter, (8) GetColor, (9) ServerResponse, (10) SetBaud, or (11) IPAddress parameter to an ActiveX control in (a) webvact.ocx, (b) dvs.ocx, or (c) webdact.ocx.
Multiple SQL injection vulnerabilities in Advantech/BroadWin WebAccess before 7.0 allow remote attackers to execute arbitrary SQL commands via crafted string input.
SQL injection vulnerability in Advantech/BroadWin WebAccess before 7.0 allows remote attackers to execute arbitrary SQL commands via a malformed URL.
SQL injection vulnerability in Advantech/BroadWin WebAccess before 7.0 allows remote attackers to execute arbitrary SQL commands via crafted string input.
A CWE-79 "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The vulnerability can be exploited remotely leveraging a rogue Wi-Fi access point with a malicious SSID.
If an attacker can trick an authenticated user into loading a maliciously crafted .zip file onto Advantech WebAccess version 8.4.5, a web shell could be used to give the attacker full control of the SCADA server.
A vulnerability was identified in Advantech WISE-6610 1.2.1_20251110. Affected is an unknown function of the file /cgi-bin/luci/admin/openvpn_apply of the component Background Management. Such manipulation of the argument delete_file leads to os command injection. The attack can be executed remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Advantech WebAccess/VPN versions prior to 1.1.5 contain a command injection vulnerability in AppManagementController.appUpgradeAction() that allows an authenticated system administrator to execute arbitrary commands as the web server user (www-data) by supplying a crafted uploaded filename.
Advantech iView versions prior to v5.7.04 build 6425 contain a vulnerability within the SNMP management tool that allows for remote attackers to bypass authentication checks and reach a SQL injection vulnerability within the ‘ztp_search_value’ parameter to the ‘NetworkServlet’ endpoint. Successful exploitation allows for remote code execution with administrator privileges.
Advantech iView versions prior to v5.7.04 build 6425 contain a vulnerability within the SNMP management tool that allows for remote attackers to bypass authentication checks and reach a SQL injection vulnerability within the ‘getInventoryReportData’ parameter to the ‘NetworkServlet’ endpoint. Successful exploitation allows for remote code execution with administrator privileges.
A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The source of the vulnerability relies on multiple parameters belonging to the "multiple_ssid_htm" API which are not properly sanitized before being concatenated to OS level commands.
A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The source of the vulnerability relies on multiple parameters belonging to the "basic_htm" API which are not properly sanitized before being concatenated to OS level commands.
A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The source of the vulnerability relies on multiple parameters belonging to the "sta_log_htm" API which are not properly sanitized before being concatenated to OS level commands.
A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The source of the vulnerability relies on multiple parameters belonging to the "applications_apply" API which are not properly sanitized before being concatenated to OS level commands.
A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The source of the vulnerability relies on multiple parameters belonging to the "lan_apply" API which are not properly sanitized before being concatenated to OS level commands.
A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The source of the vulnerability relies on multiple parameters belonging to the "export_log" API which are not properly sanitized before being concatenated to OS level commands.
A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The source of the vulnerability relies on multiple parameters belonging to the "mp_apply" API which are not properly sanitized before being concatenated to OS level commands.
A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The source of the vulnerability relies on multiple parameters belonging to the "connection_profile_apply" API which are not properly sanitized before being concatenated to OS level commands.
A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The source of the vulnerability relies on multiple parameters belonging to the "certificate_file_remove" API which are not properly sanitized before being concatenated to OS level commands.
A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The source of the vulnerability relies on multiple parameters belonging to the "snmp_apply" API which are not properly sanitized before being concatenated to OS level commands.
A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The source of the vulnerability relies on multiple parameters belonging to the "scan_ap" API which are not properly sanitized before being concatenated to OS level commands.
A CWE-15 "External Control of System or Configuration Setting" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The vulnerability can be exploited by authenticated users by restoring a tampered configuration backup.
In Advantech WebAccss/SCADA v9.1.3 and prior, there is an arbitrary file upload vulnerability that could allow an attacker to modify the file extension of a certificate file to ASP when uploading it, which can lead to remote code execution.
In Advantech WebAccss/SCADA v9.1.3 and prior, there is an arbitrary file overwrite vulnerability, which could allow an attacker to overwrite any file in the operating system (including system files), inject code into an XLS file, and modify the file extension, which could lead to arbitrary code execution.
In Advantech WebAccss/SCADA v9.1.3 and prior, there is an arbitrary file upload vulnerability that could allow an attacker to upload an ASP script file to a webserver when logged in as manager user, which can lead to arbitrary code execution.
Stack-based buffer overflow in Advantech WebAccess, formerly BroadWin WebAccess, before 8.0 allows remote attackers to execute arbitrary code via a crafted ip_address parameter in an HTML document.
Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple relative path traversal vulnerabilities exist that may allow an authenticated user to use a specially crafted file to delete files outside the application’s control.
An Absolute Path Traversal issue was discovered in Advantech WebAccess Version 8.1 and prior. The absolute path traversal vulnerability has been identified, which may allow an attacker to traverse the file system to access restricted files or directories.
An issue was discovered in Advantech SUISAccess Server Version 3.0 and prior. The directory traversal/file upload error allows an attacker to upload and unpack a zip file.
| CVE ID ⇅ | Severity ↓ | Description | |
|---|---|---|---|
| CVE-2015-6476 | HIGH | Advantech EKI-122x-BE devices with firmware before 1.65, EKI-132x devices with firmware before 1.98,… | › |
| CVE-2014-9208 | HIGH | Multiple stack-based buffer overflows in unspecified DLL files in Advantech WebAccess before 8.0.1 a… | › |
| CVE-2014-8385 | HIGH | Buffer overflow on Advantech EKI-1200 gateways with firmware before 1.63 allows remote attackers to … | › |
| CVE-2012-0243 | HIGH | Buffer overflow in an ActiveX control in bwocxrun.ocx in Advantech/BroadWin WebAccess before 7.0 all… | › |
| CVE-2012-0242 | HIGH | Format string vulnerability in Advantech/BroadWin WebAccess before 7.0 allows remote attackers to ex… | › |
| CVE-2012-0240 | HIGH | GbScriptAddUp.asp in Advantech/BroadWin WebAccess before 7.0 does not properly perform authenticatio… | › |
| CVE-2012-0238 | HIGH | Stack-based buffer overflow in opcImg.asp in Advantech/BroadWin WebAccess before 7.0 allows remote a… | › |
| CVE-2011-4526 | HIGH | Buffer overflow in an ActiveX control in Advantech/BroadWin WebAccess before 7.0 might allow remote … | › |
| CVE-2011-4525 | HIGH | Advantech/BroadWin WebAccess before 7.0 allows remote attackers to trigger the extraction of arbitra… | › |
| CVE-2011-4524 | HIGH | Buffer overflow in Advantech/BroadWin WebAccess before 7.0 allows remote attackers to execute arbitr… | › |
| CVE-2011-1914 | HIGH | Buffer overflow in the Advantech ADAM OLE for Process Control (OPC) Server ActiveX control in ADAM O… | › |
| CVE-2011-4041 | HIGH | webvrpcs.exe in Advantech/BroadWin WebAccess allows remote attackers to execute arbitrary code or ob… | › |
| CVE-2011-0488 | HIGH | Stack-based buffer overflow in NTWebServer.exe in the test web service in InduSoft NTWebServer, as d… | › |
| CVE-2008-5848 | HIGH | The Advantech ADAM-6000 module has 00000000 as its default password, which makes it easier for remot… | › |
| CVE-2011-0340 | HIGH | Multiple buffer overflows in the ISSymbol ActiveX control in ISSymbol.ocx 61.6.0.0 and 301.1009.2904… | › |
| CVE-2014-8387 | HIGH | cgi/utility.cgi in Advantech EKI-6340 2.05 Wi-Fi Mesh Access Point allows remote authenticated users… | › |
| CVE-2014-2366 | HIGH | upAdminPg.asp in Advantech WebAccess before 7.2 allows remote authenticated users to discover creden… | › |
| CVE-2025-14849 | HIGH | Advantech WebAccess/SCADA is vulnerable to unrestricted file upload, which may allow an attacker to… | › |
| CVE-2025-53515 | HIGH | A vulnerability exists in Advantech iView that allows for SQL injection and remote code execution t… | › |
| CVE-2025-53475 | HIGH | A vulnerability exists in Advantech iView that could allow for SQL injection and remote code execut… | › |
| CVE-2025-52577 | HIGH | A vulnerability exists in Advantech iView that could allow SQL injection and remote code execution … | › |
| CVE-2024-38308 | HIGH | Advantech ADAM 5550's web application includes a "logs" page where all the HTTP requests received a… | › |
| CVE-2023-3983 | HIGH | An authenticated SQL injection vulnerability exists in Advantech iView versions prior to v5.7.4 buil… | › |
| CVE-2023-3256 | HIGH | Advantech R-SeeNet versions 2.4.22 allows low-level users to access and load the content of local … | › |
| CVE-2023-2575 | HIGH | Advantech EKI-1524, EKI-1522, EKI-1521 devices through 1.21 are affected by a Stack-based Buffer Ove… | › |
| CVE-2023-2574 | HIGH | Advantech EKI-1524, EKI-1522, EKI-1521 devices through 1.21 are affected by an command injection vul… | › |
| CVE-2023-2573 | HIGH | Advantech EKI-1524, EKI-1522, EKI-1521 devices through 1.21 are affected by an command injection vul… | › |
| CVE-2021-40396 | HIGH | A privilege escalation vulnerability exists in the installation of Advantech DeviceOn/iService 1.1.7… | › |
| CVE-2021-40389 | HIGH | A privilege escalation vulnerability exists in the installation of Advantech DeviceOn/iEdge Server 1… | › |
| CVE-2021-40388 | HIGH | A privilege escalation vulnerability exists in Advantech SQ Manager Server 1.0.6. A specially-crafte… | › |
| CVE-2021-21917 | HIGH | An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet … | › |
| CVE-2021-21916 | HIGH | An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet … | › |
| CVE-2021-21915 | HIGH | An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet … | › |
| CVE-2020-13555 | HIGH | An exploitable local privilege elevation vulnerability exists in the file system permissions of Adva… | › |
| CVE-2020-13553 | HIGH | An exploitable local privilege elevation vulnerability exists in the file system permissions of Adva… | › |
| CVE-2020-13552 | HIGH | An exploitable local privilege elevation vulnerability exists in the file system permissions of Adva… | › |
| CVE-2020-13551 | HIGH | An exploitable local privilege elevation vulnerability exists in the file system permissions of Adva… | › |
| CVE-2020-12026 | HIGH | Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple relative path traversal v… | › |
| CVE-2020-10607 | HIGH | In Advantech WebAccess, Versions 8.4.2 and prior. A stack-based buffer overflow vulnerability caused… | › |
| CVE-2019-10961 | HIGH | In Advantech WebAccess HMI Designer Version 2.1.9.23 and prior, processing specially crafted MCR fil… | › |
| CVE-2018-15704 | HIGH | Advantech WebAccess 8.3.2 and below is vulnerable to a stack buffer overflow vulnerability. A remote… | › |
| CVE-2017-12704 | HIGH | A heap-based buffer overflow issue was discovered in Advantech WebAccess versions prior to V8.2_2017… | › |
| CVE-2017-12702 | HIGH | An Externally Controlled Format String issue was discovered in Advantech WebAccess versions prior to… | › |
| CVE-2015-3946 | HIGH | Cross-site request forgery (CSRF) vulnerability in Advantech WebAccess before 8.1 allows remote atta… | › |
| CVE-2025-14850 | HIGH | Advantech WebAccess/SCADA is vulnerable to directory traversal, which may allow an attacker to delet… | › |
| CVE-2016-0858 | HIGH | Race condition in Advantech WebAccess before 8.1 allows remote attackers to execute arbitrary code o… | › |
| CVE-2015-6467 | HIGH | Advantech WebAccess before 8.1 allows remote attackers to execute arbitrary code via vectors involvi… | › |
| CVE-2015-3947 | HIGH | SQL injection vulnerability in Advantech WebAccess before 8.1 allows remote authenticated users to e… | › |
| CVE-2024-39275 | HIGH | Cookies of authenticated Advantech ADAM-5630 users remain as active valid cookies when a session is… | › |
| CVE-2024-28948 | HIGH | Advantech ADAM-5630 contains a cross-site request forgery (CSRF) vulnerability. It allows an attacke… | › |
| CVE-2025-14252 | HIGH | An Improper Access Control vulnerability in Advantech SUSI driver (susi.sys) allows attackers to rea… | › |
| CVE-2021-40397 | HIGH | A privilege escalation vulnerability exists in the installation of Advantech WISE-PaaS/OTA Server 3.… | › |
| CVE-2021-21912 | HIGH | A privilege escalation vulnerability exists in the Windows version of installation for Advantech R-S… | › |
| CVE-2021-21911 | HIGH | A privilege escalation vulnerability exists in the Windows version of installation for Advantech R-S… | › |
| CVE-2021-21910 | HIGH | A privilege escalation vulnerability exists in the Windows version of installation for Advantech R-S… | › |
| CVE-2020-13554 | HIGH | An exploitable local privilege elevation vulnerability exists in the file system permissions of Adva… | › |
| CVE-2020-16229 | HIGH | Advantech WebAccess HMI Designer, Versions 2.1.9.31 and prior. Processing specially crafted project … | › |
| CVE-2020-16217 | HIGH | Advantech WebAccess HMI Designer, Versions 2.1.9.31 and prior. A double free vulnerability caused by… | › |
| CVE-2020-16215 | HIGH | Advantech WebAccess HMI Designer, Versions 2.1.9.31 and prior. Processing specially crafted project … | › |
| CVE-2020-16213 | HIGH | Advantech WebAccess HMI Designer, Versions 2.1.9.31 and prior. Processing specially crafted project … | › |
| CVE-2020-16207 | HIGH | Advantech WebAccess HMI Designer, Versions 2.1.9.31 and prior. Multiple heap-based buffer overflow v… | › |
| CVE-2018-14828 | HIGH | Advantech WebAccess 8.3.1 and earlier has an improper privilege management vulnerability, which may … | › |
| CVE-2018-8841 | HIGH | In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAcc… | › |
| CVE-2017-5175 | HIGH | Advantech WebAccess 8.1 and earlier contains a DLL hijacking vulnerability which may allow an attack… | › |
| CVE-2018-8837 | HIGH | Processing specially crafted .pm3 files in Advantech WebAccess HMI Designer 2.1.7.32 and prior may c… | › |
| CVE-2018-8835 | HIGH | Double free vulnerabilities in Advantech WebAccess HMI Designer 2.1.7.32 and prior caused by process… | › |
| CVE-2018-8833 | HIGH | Heap-based buffer overflow vulnerabilities in Advantech WebAccess HMI Designer 2.1.7.32 and prior ca… | › |
| CVE-2017-12705 | HIGH | A Heap-Based Buffer Overflow issue was discovered in Advantech WebOP. A maliciously crafted project … | › |
| CVE-2017-12717 | HIGH | An Uncontrolled Search Path Element issue was discovered in Advantech WebAccess versions prior to V8… | › |
| CVE-2017-12713 | HIGH | An Incorrect Permission Assignment for Critical Resource issue was discovered in Advantech WebAccess… | › |
| CVE-2017-12711 | HIGH | An Incorrect Privilege Assignment issue was discovered in Advantech WebAccess versions prior to V8.2… | › |
| CVE-2016-9353 | HIGH | An issue was discovered in Advantech SUISAccess Server Version 3.0 and prior. The admin password is … | › |
| CVE-2013-1627 | HIGH | Absolute path traversal vulnerability in NTWebServer.exe in Indusoft Studio 7.0 and earlier and Adva… | › |
| CVE-2020-13550 | HIGH | A local file inclusion vulnerability exists in the installation functionality of Advantech WebAccess… | › |
| CVE-2025-48891 | HIGH | A vulnerability exists in Advantech iView that could allow for SQL injection through the CUtils.che… | › |
| CVE-2025-13373 | HIGH | Advantech iView versions 5.7.05.7057 and prior do not properly sanitize SNMP v1 trap (Port 162) requ… | › |
| CVE-2022-50594 | HIGH | Advantech iView versions prior to v5.7.04 build 6425 contain a vulnerability within the SNMP managem… | › |
| CVE-2023-52335 | HIGH | Advantech iView ConfigurationServlet SQL Injection Information Disclosure Vulnerability. This vulner… | › |
| CVE-2022-3323 | HIGH | An SQL injection vulnerability in Advantech iView 5.7.04.6469. The specific flaw exists within the C… | › |
| CVE-2019-18231 | HIGH | Advantech Spectre RT ERT351 Versions 5.1.3 and prior logins and passwords are transmitted in clear t… | › |
| CVE-2021-22656 | HIGH | Advantech iView versions prior to v5.7.03.6112 are vulnerable to directory traversal, which may allo… | › |
| CVE-2021-22654 | HIGH | Advantech iView versions prior to v5.7.03.6112 are vulnerable to a SQL injection, which may allow an… | › |
| CVE-2020-14499 | HIGH | Advantech iView, versions 5.6 and prior, has an improper access control vulnerability. Successful ex… | › |
| CVE-2020-12018 | HIGH | Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. An out-of-bounds vulnerability exi… | › |
| CVE-2020-12014 | HIGH | Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Input is not properly sanitized an… | › |
| CVE-2019-3942 | HIGH | Advantech WebAccess 8.3.4 does not properly restrict an RPC call that allows unauthenticated, remote… | › |
| CVE-2019-18227 | HIGH | Advantech WISE-PaaS/RMM, Versions 3.3.29 and prior. XXE vulnerabilities exist that may allow disclos… | › |
| CVE-2019-16901 | HIGH | Advantech WebAccess/HMI Designer 2.1.9.31 has Exception Handler Chain corruption starting at Unknown… | › |
| CVE-2019-16900 | HIGH | Advantech WebAccess/HMI Designer 2.1.9.31 has a User Mode Write AV starting at MSVCR90!memcpy+0x0000… | › |
| CVE-2019-16899 | HIGH | In Advantech WebAccess/HMI Designer 2.1.9.31, Data from a Faulting Address controls Code Flow starti… | › |
| CVE-2019-3941 | HIGH | Advantech WebAccess 8.3.4 allows unauthenticated, remote attackers to delete arbitrary files via IOC… | › |
| CVE-2019-6554 | HIGH | Advantech WebAccess/SCADA, Versions 8.3.5 and prior. An improper access control vulnerability may al… | › |
| CVE-2018-14820 | HIGH | Advantech WebAccess 8.3.1 and earlier has a .dll component that is susceptible to external control o… | › |
| CVE-2018-7503 | HIGH | In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAcc… | › |
| CVE-2018-7501 | HIGH | In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAcc… | › |
| CVE-2018-7495 | HIGH | In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAcc… | › |
| CVE-2018-10590 | HIGH | In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAcc… | › |
| CVE-2017-16736 | HIGH | An Unrestricted Upload Of File With Dangerous Type issue was discovered in Advantech WebAccess versi… | › |
| CVE-2017-16753 | HIGH | An Improper Input Validation issue was discovered in Advantech WebAccess versions prior to 8.3. WebA… | › |
| CVE-2017-16728 | HIGH | An Untrusted Pointer Dereference issue was discovered in Advantech WebAccess versions prior to 8.3. … | › |
| CVE-2017-12719 | HIGH | An Untrusted Pointer Dereference issue was discovered in Advantech WebAccess versions prior to V8.2_… | › |
| CVE-2017-12710 | HIGH | A SQL Injection issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. By subm… | › |
| CVE-2016-9349 | HIGH | An issue was discovered in Advantech SUISAccess Server Version 3.0 and prior. An attacker could trav… | › |
| CVE-2016-0860 | HIGH | Buffer overflow in the BwpAlarm subsystem in Advantech WebAccess before 8.1 allows remote attackers … | › |
| CVE-2016-0855 | HIGH | Directory traversal vulnerability in Advantech WebAccess before 8.1 allows remote attackers to list … | › |
| CVE-2016-0853 | HIGH | Advantech WebAccess before 8.1 allows remote attackers to obtain sensitive information via crafted i… | › |
| CVE-2016-0852 | HIGH | Advantech WebAccess before 8.1 allows remote attackers to bypass an intended administrative requirem… | › |
| CVE-2016-0851 | HIGH | Advantech WebAccess before 8.1 allows remote attackers to cause a denial of service (out-of-bounds m… | › |
| CVE-2014-8386 | HIGH | Multiple stack-based buffer overflows in Advantech AdamView 4.3 and earlier allow remote attackers t… | › |
| CVE-2014-2368 | HIGH | The BrowseFolder method in the bwocxrun ActiveX control in Advantech WebAccess before 7.2 allows rem… | › |
| CVE-2014-2367 | HIGH | The ChkCookie subroutine in an ActiveX control in broadweb/include/gChkCook.asp in Advantech WebAcce… | › |
| CVE-2014-2364 | HIGH | Multiple stack-based buffer overflows in Advantech WebAccess before 7.2 allow remote attackers to ex… | › |
| CVE-2012-0244 | HIGH | Multiple SQL injection vulnerabilities in Advantech/BroadWin WebAccess before 7.0 allow remote attac… | › |
| CVE-2012-0234 | HIGH | SQL injection vulnerability in Advantech/BroadWin WebAccess before 7.0 allows remote attackers to ex… | › |
| CVE-2011-4521 | HIGH | SQL injection vulnerability in Advantech/BroadWin WebAccess before 7.0 allows remote attackers to ex… | › |
| CVE-2024-50376 | HIGH | A CWE-79 "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" was … | › |
| CVE-2023-2866 | HIGH | If an attacker can trick an authenticated user into loading a maliciously crafted .zip file onto Ad… | › |
| CVE-2026-2670 | HIGH | A vulnerability was identified in Advantech WISE-6610 1.2.1_20251110. Affected is an unknown functio… | › |
| CVE-2025-34239 | HIGH | Advantech WebAccess/VPN versions prior to 1.1.5 contain a command injection vulnerability in AppMana… | › |
| CVE-2022-50595 | HIGH | Advantech iView versions prior to v5.7.04 build 6425 contain a vulnerability within the SNMP managem… | › |
| CVE-2022-50592 | HIGH | Advantech iView versions prior to v5.7.04 build 6425 contain a vulnerability within the SNMP managem… | › |
| CVE-2024-50369 | HIGH | A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')… | › |
| CVE-2024-50368 | HIGH | A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')… | › |
| CVE-2024-50367 | HIGH | A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')… | › |
| CVE-2024-50366 | HIGH | A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')… | › |
| CVE-2024-50365 | HIGH | A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')… | › |
| CVE-2024-50364 | HIGH | A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')… | › |
| CVE-2024-50363 | HIGH | A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')… | › |
| CVE-2024-50362 | HIGH | A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')… | › |
| CVE-2024-50361 | HIGH | A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')… | › |
| CVE-2024-50360 | HIGH | A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')… | › |
| CVE-2024-50359 | HIGH | A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')… | › |
| CVE-2024-50358 | HIGH | A CWE-15 "External Control of System or Configuration Setting" was discovered affecting the followin… | › |
| CVE-2023-32628 | HIGH | In Advantech WebAccss/SCADA v9.1.3 and prior, there is an arbitrary file upload vulnerability t… | › |
| CVE-2023-32540 | HIGH | In Advantech WebAccss/SCADA v9.1.3 and prior, there is an arbitrary file overwrite vulnerability, w… | › |
| CVE-2023-22450 | HIGH | In Advantech WebAccss/SCADA v9.1.3 and prior, there is an arbitrary file upload vulnerability tha… | › |
| CVE-2014-8388 | HIGH | Stack-based buffer overflow in Advantech WebAccess, formerly BroadWin WebAccess, before 8.0 allows r… | › |
| CVE-2020-12010 | HIGH | Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple relative path traversal v… | › |
| CVE-2017-7929 | HIGH | An Absolute Path Traversal issue was discovered in Advantech WebAccess Version 8.1 and prior. The ab… | › |
| CVE-2016-9351 | HIGH | An issue was discovered in Advantech SUISAccess Server Version 3.0 and prior. The directory traversa… | › |