Easyrobotics

Er-lite Firmware

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.33%
  • Veröffentlicht 24.06.2020 06:15:11
  • Zuletzt bearbeitet 21.11.2024 04:55:07

The Apache server on port 80 that host the web interface is vulnerable to a DoS by spamming incomplete HTTP headers, effectively blocking the access to the dashboard.

  • EPSS 0.28%
  • Veröffentlicht 24.06.2020 05:15:13
  • Zuletzt bearbeitet 21.11.2024 04:55:06

The access tokens for the REST API are directly derived (sha256 and base64 encoding) from the publicly available default credentials from the Control Dashboard (refer to CVE-2020-10270 for related flaws). This flaw in combination with CVE-2020-10273 ...

  • EPSS 0.17%
  • Veröffentlicht 24.06.2020 05:15:13
  • Zuletzt bearbeitet 21.11.2024 04:55:07

The access tokens for the REST API are directly derived from the publicly available default credentials for the web interface. Given a USERNAME and a PASSWORD, the token string is generated directly with base64(USERNAME:sha256(PASSWORD)). An unauthor...

  • EPSS 0.36%
  • Veröffentlicht 24.06.2020 05:15:13
  • Zuletzt bearbeitet 21.11.2024 04:55:07

The password for the safety PLC is the default and thus easy to find (in manuals, etc.). This allows a manipulated program to be uploaded to the safety PLC, effectively disabling the emergency stop in case an object is too close to the robot. Navigat...

  • EPSS 0.06%
  • Veröffentlicht 24.06.2020 05:15:13
  • Zuletzt bearbeitet 21.11.2024 04:55:07

There is no mechanism in place to prevent a bad operator to boot from a live OS image, this can lead to extraction of sensible files (such as the shadow file) or privilege escalation by manually adding a new user with sudo privileges on the machine.