VYPR

ctrlX OS

by Rexroth

CVEs (17)

  • CVE-2025-24351HigApr 30, 2025
    risk 0.57cvss 8.8epss 0.01

    A vulnerability in the “Remote Logging” functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to execute arbitrary OS commands in the context of user “root” via a crafted HTTP request.

  • CVE-2025-48860HigAug 14, 2025
    risk 0.52cvss 8.0epss 0.00

    A vulnerability in the web application of the ctrlX OS setup mechanism facilitated an authenticated (low privileged) attacker to gain remote access to backup archives created by a user with elevated permissions. Depending on the content of the backup archive, the attacker may have been able to access sensitive data.

  • CVE-2025-24346HigApr 30, 2025
    risk 0.49cvss 7.5epss 0.00

    A vulnerability in the “Proxy” functionality of the web application of ctrlX OS allows a remote authenticated (lowprivileged) attacker to manipulate the “/etc/environment” file via a crafted HTTP request.

  • CVE-2025-48862HigAug 14, 2025
    risk 0.46cvss 7.1epss 0.00

    Ambiguous wording in the web interface of the ctrlX OS setup mechanism could lead the user to believe that the backup file is encrypted when a password is set. However, only the private key - if available in the backup - is encrypted, while the backup file itself remains unencrypted.

  • CVE-2025-24350HigApr 30, 2025
    risk 0.46cvss 7.1epss 0.00

    A vulnerability in the “Certificates and Keys” functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to write arbitrary certificates in arbitrary file system paths via a crafted HTTP request.

  • CVE-2025-24349HigApr 30, 2025
    risk 0.46cvss 7.1epss 0.00

    A vulnerability in the “Network Interfaces” functionality of the web application of ctrlX OS allows a remote authenticated (lowprivileged) attacker to delete the configuration of physical network interfaces via a crafted HTTP request.

  • CVE-2025-24338HigApr 30, 2025
    risk 0.46cvss 7.1epss 0.00

    A vulnerability in the “Manages app data” functionality of the web application of ctrlX OS allows a remote authenticated (lowprivileged) attacker to execute arbitrary client-side code in the context of another user's browser via multiple crafted HTTP requests.

  • CVE-2025-27532MedApr 30, 2025
    risk 0.42cvss 6.5epss 0.00

    A vulnerability in the “Backup & Restore” functionality of the web application of ctrlX OS allows a remote authenticated (lowprivileged) attacker to access secret information via multiple crafted HTTP requests.

  • CVE-2025-24347MedApr 30, 2025
    risk 0.42cvss 6.5epss 0.00

    A vulnerability in the “Network Interfaces” functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to manipulate the network configuration file via a crafted HTTP request.

  • CVE-2025-24341MedApr 30, 2025
    risk 0.42cvss 6.5epss 0.00

    A vulnerability in the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to induce a Denial-of-Service (DoS) condition on the device via multiple crafted HTTP requests. In the worst case, a full power cycle is needed to regain control of the device.

  • CVE-2025-24340MedApr 30, 2025
    risk 0.42cvss 6.5epss 0.00

    A vulnerability in the users configuration file of ctrlX OS may allow a remote authenticated (low-privileged) attacker to recover the plaintext passwords of other users.

  • CVE-2025-24345MedApr 30, 2025
    risk 0.41cvss 6.3epss 0.00

    A vulnerability in the “Hosts” functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to manipulate the “hosts” file in an unintended manner via a crafted HTTP request.

  • CVE-2025-24344MedApr 30, 2025
    risk 0.41cvss 6.3epss 0.00

    A vulnerability in the error notification messages of the web application of ctrlX OS allows a remote unauthenticated attacker to inject arbitrary HTML tags and, possibly, execute arbitrary client-side code in the context of another user's browser via a crafted HTTP request.

  • CVE-2025-24348MedApr 30, 2025
    risk 0.35cvss 5.4epss 0.00

    A vulnerability in the “Network Interfaces” functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to manipulate the wireless network configuration file via a crafted HTTP request.

  • CVE-2025-24343MedApr 30, 2025
    risk 0.35cvss 5.4epss 0.00

    A vulnerability in the “Manages app data” functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to write arbitrary files in arbitrary file system paths via a crafted HTTP request.

  • CVE-2025-48861MedAug 14, 2025
    risk 0.34cvss 5.3epss 0.00

    A vulnerability in the Task API endpoint of the ctrlX OS setup mechanism allowed a remote, unauthenticated attacker to access and extract internal application data, including potential debug logs and the version of installed apps.

  • CVE-2025-24342MedApr 30, 2025
    risk 0.34cvss 5.3epss 0.00

    A vulnerability in the login functionality of the web application of ctrlX OS allows a remote unauthenticated attacker to guess valid usernames via multiple crafted HTTP requests.