Mersive

Solstice Pod Firmware

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.09%
  • Veröffentlicht 04.12.2025 20:45:13
  • Zuletzt bearbeitet 23.12.2025 00:09:25

Solstice Pod API (version 5.5, 6.2) contains an unauthenticated API endpoint (`/api/config`) that exposes sensitive information such as the session key, server version, product details, and display name. Unauthorized users can extract live session in...

Exploit
  • EPSS 0.18%
  • Veröffentlicht 23.12.2020 15:15:16
  • Zuletzt bearbeitet 21.11.2024 05:27:38

In Solstice Pod before 3.0.3, the web services allow users to connect to them over unencrypted channels via the Browser Look-in feature. An attacker suitably positioned to view a legitimate user's network traffic could record and monitor their intera...

Exploit
  • EPSS 0.34%
  • Veröffentlicht 23.12.2020 15:15:16
  • Zuletzt bearbeitet 21.11.2024 05:27:38

In Solstice Pod before 3.3.0 (or Open4.3), the screen key can be enumerated using brute-force attacks via the /lookin/info Solstice Open Control API because there are only 1.7 million possibilities.

Exploit
  • EPSS 0.34%
  • Veröffentlicht 23.12.2020 15:15:16
  • Zuletzt bearbeitet 21.11.2024 05:27:38

In Solstice Pod before 3.3.0 (or Open4.3), the Administrator password can be enumerated using brute-force attacks via the /Config/service/initModel?password= Solstice Open Control API because there is no complexity requirement (e.g., it might be all ...

Exploit
  • EPSS 1.34%
  • Veröffentlicht 11.11.2020 15:15:11
  • Zuletzt bearbeitet 21.11.2024 05:21:19

Solstice-Pod up to 5.0.2 WEBRTC server mishandles the format-string specifiers %x; %p; %c and %s in the screen_key, display_name, browser_name, and operation_system parameter during the authentication process. This may crash the server and force Sols...