Filtered by vendor Pentasecurity
Subscribe
Total
4 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-35582 | 1 Pentasecurity | 1 Wapples | 2024-11-21 | N/A | 8.8 HIGH |
Penta Security Systems Inc WAPPLES 4.0.*, 5.0.0.*, 5.0.12.* are vulnerable to Incorrect Access Control. The operating system that WAPPLES runs on has a built-in non-privileged user penta with a predefined password. The password for this user, as well as its existence, is not disclosed in the documentation. Knowing the credentials, attackers can use this feature to gain uncontrolled access to the device and therefore are considered an undocumented possibility for remote control. | |||||
CVE-2022-35413 | 1 Pentasecurity | 1 Wapples | 2024-11-21 | N/A | 9.8 CRITICAL |
WAPPLES through 6.0 has a hardcoded systemi account. A threat actor could use this account to access the system configuration and confidential information (such as SSL keys) via an HTTPS request to the /webapi/ URI on port 443 or 5001. | |||||
CVE-2022-31324 | 1 Pentasecurity | 1 Wapples | 2024-11-21 | N/A | 6.5 MEDIUM |
An arbitrary file download vulnerability in the downloadAction() function of Penta Security Systems Inc WAPPLES v6.0 r3 4.10-hotfix1 allows attackers to download arbitrary files via a crafted POST request. | |||||
CVE-2022-31322 | 1 Pentasecurity | 1 Wapples | 2024-11-21 | N/A | 7.8 HIGH |
Penta Security Systems Inc WAPPLES v6.0 r3 4.10-hotfix1 allows attackers to escalate privileges via overwriting files using SUID flagged executables. |