Vulnerabilities (CVE)

Filtered by vendor Advantech Subscribe
Total 319 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-2574 1 Advantech 6 Eki-1521, Eki-1521 Firmware, Eki-1522 and 3 more 2025-02-13 N/A 8.8 HIGH
Advantech EKI-1524, EKI-1522, EKI-1521 devices through 1.21 are affected by an command injection vulnerability in the device name input field, which can be triggered by authenticated users via a crafted POST request.
CVE-2023-2573 1 Advantech 6 Eki-1521, Eki-1521 Firmware, Eki-1522 and 3 more 2025-02-13 N/A 8.8 HIGH
Advantech EKI-1524, EKI-1522, EKI-1521 devices through 1.21 are affected by an command injection vulnerability in the NTP server input field, which can be triggered by authenticated users via a crafted POST request.
CVE-2023-52335 1 Advantech 1 Iview 2025-01-09 N/A 7.5 HIGH
Advantech iView ConfigurationServlet SQL Injection Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech iView. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ConfigurationServlet servlet, which listens on TCP port 8080 by default. When parsing the column_value element, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-17863.
CVE-2023-4215 1 Advantech 1 Webaccess 2024-10-24 N/A 7.5 HIGH
Advantech WebAccess version 9.1.3 contains an exposure of sensitive information to an unauthorized actor vulnerability that could leak user credentials.
CVE-2024-39275 1 Advantech 2 Adam-5630, Adam-5630 Firmware 2024-10-07 N/A 8.8 HIGH
Cookies of authenticated Advantech ADAM-5630 users remain as active valid cookies when a session is closed. Forging requests with a legitimate cookie, even if the session was terminated, allows an unauthorized attacker to act with the same level of privileges of the legitimate user.
CVE-2024-38308 1 Advantech 2 Adam-5550, Adam 5550-firmware 2024-10-07 N/A 6.1 MEDIUM
Advantech ADAM 5550's web application includes a "logs" page where all the HTTP requests received are displayed to the user. The device doesn't correctly neutralize malicious code when parsing HTTP requests to generate page output.
CVE-2024-34542 1 Advantech 2 Adam-5630, Adam-5630 Firmware 2024-10-07 N/A 5.7 MEDIUM
Advantech ADAM-5630 shares user credentials plain text between the device and the user source device during the login process.
CVE-2024-37187 1 Advantech 2 Adam-5550, Adam-5550 Firmware 2024-10-07 N/A 5.7 MEDIUM
Advantech ADAM-5550 share user credentials with a low level of encryption, consisting of base 64 encoding.
CVE-2024-28948 1 Advantech 2 Adam-5630, Adam-5630 Firmware 2024-10-04 N/A 8.8 HIGH
Advantech ADAM-5630 contains a cross-site request forgery (CSRF) vulnerability. It allows an attacker to partly circumvent the same origin policy, which is designed to prevent different websites from interfering with each other.
CVE-2008-5848 1 Advantech 14 Adam-6015, Adam-6017, Adam-6018 and 11 more 2024-02-14 10.0 HIGH N/A
The Advantech ADAM-6000 module has 00000000 as its default password, which makes it easier for remote attackers to obtain access through an HTTP session, and (1) monitor or (2) control the module's Modbus/TCP I/O activity.
CVE-2023-1437 1 Advantech 1 Webaccess\/scada 2024-02-01 N/A 9.8 CRITICAL
All versions prior to 9.1.4 of Advantech WebAccess/SCADA are vulnerable to use of untrusted pointers. The RPC arguments the client sent could contain raw memory pointers for the server to use as-is. This could allow an attacker to gain access to the remote file system and the ability to execute commands and overwrite files.
CVE-2022-3386 1 Advantech 1 R-seenet 2023-11-07 N/A 9.8 CRITICAL
Advantech R-SeeNet Versions 2.4.17 and prior are vulnerable to a stack-based buffer overflow. An unauthorized attacker can use an outsized filename to overflow the stack buffer and enable remote code execution.
CVE-2022-3387 1 Advantech 1 R-seenet 2023-11-07 N/A 5.3 MEDIUM
Advantech R-SeeNet Versions 2.4.19 and prior are vulnerable to path traversal attacks. An unauthorized attacker could remotely exploit vulnerable PHP code to delete .PDF files.
CVE-2022-3385 1 Advantech 1 R-seenet 2023-11-07 N/A 9.8 CRITICAL
Advantech R-SeeNet Versions 2.4.17 and prior are vulnerable to a stack-based buffer overflow. An unauthorized attacker can remotely overflow the stack buffer and enable remote code execution.
CVE-2018-14820 1 Advantech 1 Webaccess 2023-11-07 6.4 MEDIUM 7.5 HIGH
Advantech WebAccess 8.3.1 and earlier has a .dll component that is susceptible to external control of file name or path vulnerability, which may allow an arbitrary file deletion when processing.
CVE-2018-14816 1 Advantech 1 Webaccess 2023-11-07 7.5 HIGH 9.8 CRITICAL
Advantech WebAccess 8.3.1 and earlier has several stack-based buffer overflow vulnerabilities that have been identified, which may allow an attacker to execute arbitrary code.
CVE-2018-14828 1 Advantech 1 Webaccess 2023-11-07 7.2 HIGH 7.8 HIGH
Advantech WebAccess 8.3.1 and earlier has an improper privilege management vulnerability, which may allow an attacker to access those files and perform actions at a system administrator level.
CVE-2018-14806 1 Advantech 1 Webaccess 2023-11-07 7.5 HIGH 9.8 CRITICAL
Advantech WebAccess 8.3.1 and earlier has a path traversal vulnerability which may allow an attacker to execute arbitrary code.
CVE-2023-5642 1 Advantech 1 R-seenet 2023-10-25 N/A 9.8 CRITICAL
Advantech R-SeeNet v2.4.23 allows an unauthenticated remote attacker to read from and write to the snmpmon.ini file, which contains sensitive information.
CVE-2023-3983 1 Advantech 1 Iview 2023-08-04 N/A 8.8 HIGH
An authenticated SQL injection vulnerability exists in Advantech iView versions prior to v5.7.4 build 6752. An authenticated remote attacker can bypass checks in com.imc.iview.utils.CUtils.checkSQLInjection() to perform blind SQL injection.