Connectedio

Connected Io

7 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 04.08.2023 18:15:12
  • Zuletzt bearbeitet 21.11.2024 08:05:30

Connected IO v2.1.0 and prior keeps passwords and credentials in clear-text format, allowing attackers to exfiltrate the credentials and use them to impersonate the devices.

  • EPSS 1.27%
  • Veröffentlicht 04.08.2023 18:15:12
  • Zuletzt bearbeitet 21.11.2024 08:05:30

Connected IO v2.1.0 and prior has a command as part of its communication protocol allowing the management platform to specify arbitrary OS commands for devices to execute. Attackers abusing this dangerous functionality may issue all devices OS comman...

  • EPSS 0.08%
  • Veröffentlicht 04.08.2023 18:15:12
  • Zuletzt bearbeitet 21.11.2024 08:05:30

Connected IO v2.1.0 and prior has a stack-based buffer overflow vulnerability in its communication protocol, enabling attackers to take control over devices.

  • EPSS 0.09%
  • Veröffentlicht 04.08.2023 18:15:12
  • Zuletzt bearbeitet 21.11.2024 08:05:30

Connected IO v2.1.0 and prior has an argument injection vulnerability in its iptables command message in its communication protocol, enabling attackers to execute arbitrary OS commands on devices.

  • EPSS 0.39%
  • Veröffentlicht 04.08.2023 18:15:12
  • Zuletzt bearbeitet 21.11.2024 08:05:30

Connected IO v2.1.0 and prior has an OS command injection vulnerability in the set firewall command in part of its communication protocol, enabling attackers to execute arbitrary OS commands on devices.

  • EPSS 0.09%
  • Veröffentlicht 04.08.2023 18:15:12
  • Zuletzt bearbeitet 21.11.2024 08:05:30

Connected IO v2.1.0 and prior has an argument injection vulnerability in its AT command message in its communication protocol, enabling attackers to execute arbitrary OS commands on devices.

  • EPSS 0.03%
  • Veröffentlicht 04.08.2023 18:15:11
  • Zuletzt bearbeitet 21.11.2024 08:05:29

Connected IO v2.1.0 and prior uses a hard-coded username/password pair embedded in their device's firmware used for device communication using MQTT. An attacker who gained access to these credentials is able to connect to the MQTT broker and send mes...