Automatedlogic

Webctrl

8 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Veröffentlicht 27.11.2025 01:15:46
  • Zuletzt bearbeitet 01.12.2025 15:39:33

The Access Control Bypass vulnerability found in ALC WebCTRL and Carrier i-Vu in versions up to and including 8.5 allows a malicious actor to bypass intended access restrictions and expose sensitive information via the web based building automation...

  • EPSS 0.06%
  • Veröffentlicht 27.11.2025 01:15:46
  • Zuletzt bearbeitet 01.12.2025 15:39:33

The reflective cross-site scripting vulnerability found in ALC WebCTRL and Carrier i-Vu in versions older than 8.0 affects login panels allowing a malicious actor to compromise the client browser .

  • EPSS 0.06%
  • Veröffentlicht 27.11.2025 01:15:46
  • Zuletzt bearbeitet 01.12.2025 15:39:33

A weakness in Automated Logic and Carrier i-Vu Gen5 router on driver version drv_gen5_106-01-2380, allows malformed packets to be sent through BACnet MS/TP network causing the devices to enter a fault state. This fault state requires a manual po...

  • EPSS 0.03%
  • Veröffentlicht 19.11.2025 13:18:35
  • Zuletzt bearbeitet 19.11.2025 19:14:59

Reflected XSS using a specific URL in Automated Logic WebCTRL and Carrier i-VU can allow delivery of malicious payload due to a specific GET parameter not being sanitized.

  • EPSS 0.02%
  • Veröffentlicht 19.11.2025 13:17:01
  • Zuletzt bearbeitet 19.11.2025 19:14:59

Open Redirect in URL parameter in Automated Logic WebCTRL and Carrier i-Vu versions 6.0, 6.5, 7.0, 8.0, 8.5, 9.0 may allow attackers to exploit user sessions.

  • EPSS 1.1%
  • Veröffentlicht 21.11.2024 16:15:27
  • Zuletzt bearbeitet 21.11.2024 16:15:27

An unrestricted upload of file with dangerous type in Automated Logic WebCTRL 7.0 could allow an unauthenticated user to perform remote command execution via a crafted HTTP POST request which could lead to uploading a malicious file.

  • EPSS 0.17%
  • Veröffentlicht 21.11.2024 16:15:27
  • Zuletzt bearbeitet 21.11.2024 16:15:27

A vulnerability in Automated Logic WebCTRL 7.0 could allow an attacker to send a maliciously crafted URL, which when visited by an authenticated WebCTRL user, could result in the redirection of the user to a malicious webpage via "index.jsp"

Exploit
  • EPSS 41.2%
  • Veröffentlicht 22.10.2021 12:15:07
  • Zuletzt bearbeitet 21.11.2024 06:06:07

The login portal for the Automated Logic WebCTRL/WebCTRL OEM web application contains a vulnerability that allows for reflected XSS attacks due to the operatorlocale GET parameter not being sanitized. This issue impacts versions 6.5 and below. This i...