Icc15xx
CVEs (8)
| CVE | Sev | Risk | CVSS | EPSS | KEV | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2021-34602 | 0.00 | — | 0.03 | Apr 27, 2022 | In Bender/ebee Charge Controllers in multiple versions are prone to Command injection via Web interface. An authenticated attacker could enter shell commands into some input fields that are executed with root privileges. | ||
| CVE-2021-34601 | 0.00 | — | 0.00 | Apr 27, 2022 | In Bender/ebee Charge Controllers in multiple versions are prone to Hardcoded Credentials. Bender charge controller CC612 in version 5.20.1 and below is prone to hardcoded ssh credentials. An attacker may use the password to gain administrative access to the web-UI. | ||
| CVE-2021-34592 | 0.00 | — | 0.03 | Apr 27, 2022 | In Bender/ebee Charge Controllers in multiple versions are prone to Command injection via Web interface. An authenticated attacker could enter shell commands into some input fields. | ||
| CVE-2021-34591 | 0.00 | — | 0.00 | Apr 27, 2022 | In Bender/ebee Charge Controllers in multiple versions are prone to Local privilege Escalation. An authenticated attacker could get root access via the suid applications socat, ip udhcpc and ifplugd. | ||
| CVE-2021-34590 | 0.00 | — | 0.00 | Apr 27, 2022 | In Bender/ebee Charge Controllers in multiple versions are prone to Cross-site Scripting. An authenticated attacker could write HTML Code into configuration values. These values are not properly escaped when displayed. | ||
| CVE-2021-34589 | 0.00 | — | 0.00 | Apr 27, 2022 | In Bender/ebee Charge Controllers in multiple versions are prone to an RFID leak. The RFID of the last charge event can be read without authentication via the web interface. | ||
| CVE-2021-34588 | 0.00 | — | 0.00 | Apr 27, 2022 | In Bender/ebee Charge Controllers in multiple versions are prone to unprotected data export. Backup export is protected via a random key. The key is set at user login. It is empty after reboot . | ||
| CVE-2021-34587 | 0.00 | — | 0.00 | Apr 27, 2022 | In Bender/ebee Charge Controllers in multiple versions a long URL could lead to webserver crash. The URL is used as input of an sprintf to a stack variable. |
- CVE-2021-34602Apr 27, 2022risk 0.00cvss —epss 0.03
In Bender/ebee Charge Controllers in multiple versions are prone to Command injection via Web interface. An authenticated attacker could enter shell commands into some input fields that are executed with root privileges.
- CVE-2021-34601Apr 27, 2022risk 0.00cvss —epss 0.00
In Bender/ebee Charge Controllers in multiple versions are prone to Hardcoded Credentials. Bender charge controller CC612 in version 5.20.1 and below is prone to hardcoded ssh credentials. An attacker may use the password to gain administrative access to the web-UI.
- CVE-2021-34592Apr 27, 2022risk 0.00cvss —epss 0.03
In Bender/ebee Charge Controllers in multiple versions are prone to Command injection via Web interface. An authenticated attacker could enter shell commands into some input fields.
- CVE-2021-34591Apr 27, 2022risk 0.00cvss —epss 0.00
In Bender/ebee Charge Controllers in multiple versions are prone to Local privilege Escalation. An authenticated attacker could get root access via the suid applications socat, ip udhcpc and ifplugd.
- CVE-2021-34590Apr 27, 2022risk 0.00cvss —epss 0.00
In Bender/ebee Charge Controllers in multiple versions are prone to Cross-site Scripting. An authenticated attacker could write HTML Code into configuration values. These values are not properly escaped when displayed.
- CVE-2021-34589Apr 27, 2022risk 0.00cvss —epss 0.00
In Bender/ebee Charge Controllers in multiple versions are prone to an RFID leak. The RFID of the last charge event can be read without authentication via the web interface.
- CVE-2021-34588Apr 27, 2022risk 0.00cvss —epss 0.00
In Bender/ebee Charge Controllers in multiple versions are prone to unprotected data export. Backup export is protected via a random key. The key is set at user login. It is empty after reboot .
- CVE-2021-34587Apr 27, 2022risk 0.00cvss —epss 0.00
In Bender/ebee Charge Controllers in multiple versions a long URL could lead to webserver crash. The URL is used as input of an sprintf to a stack variable.