Loading HuntDB...

M-Bus SoftwarePack

1 Version 9 CVEs

Recent CVEs

CVE-2023-35120

PiiGAB M-Bus is vulnerable to cross-site request forgery. An attacker who wants to execute a certain command could send a phishing mail to the owner of the device and hope that the owner clicks on the link. If the owner of the device has a cookie stored that allows the owner to be logged in, then the device could execute the GET or POST link request.

HIGH Jul 06, 2023

CVE-2023-34433

PiiGAB M-Bus stores passwords using a weak hash algorithm.

HIGH Jul 06, 2023

CVE-2023-34995

There are no requirements for setting a complex password for PiiGAB M-Bus, which could contribute to a successful brute force attack if the password is inline with recommended password guidelines.

HIGH Jul 06, 2023

CVE-2023-32652

PiiGAB M-Bus does not validate identification strings before processing, which could make it vulnerable to cross-site scripting attacks.

HIGH Jul 06, 2023

CVE-2023-35765

PiiGAB M-Bus stores credentials in a plaintext file, which could allow a low-level user to gain admin credentials.

MEDIUM Jul 06, 2023

CVE-2023-35987

PiiGAB M-Bus contains hard-coded credentials which it uses for authentication.

CRITICAL Jul 06, 2023

CVE-2023-31277

PiiGAB M-Bus transmits credentials in plaintext format.

HIGH Jul 06, 2023

CVE-2023-33868

The number of login attempts is not limited. This could allow an attacker to perform a brute force on HTTP basic authentication.

MEDIUM Jul 06, 2023

CVE-2023-36859

PiiGAB M-Bus SoftwarePack 900S does not correctly sanitize user input, which could allow an attacker to inject arbitrary commands.

HIGH Jul 06, 2023