Summary
Detail | |||
---|---|---|---|
Vendor | Topcon | First view | 2019-09-20 |
Product | Net-g5 Firmware | Last view | 2019-09-20 |
Version | Type | Os | |
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
CPE Name | Affected CVE |
---|---|
cpe:2.3:o:topcon:net-g5_firmware:5.2.2:*:*:*:*:*:*:* | 2 |
Related : CVE
Date | Alert | Description | |
---|---|---|---|
4.9 | 2019-09-20 | CVE-2019-11327 | An issue was discovered on Topcon Positioning Net-G5 GNSS Receiver devices with firmware 5.2.2. The web interface of the product has a local file inclusion vulnerability. An attacker with administrative privileges can craft a special URL to read arbitrary files from the device's files system. |
8.8 | 2019-09-20 | CVE-2019-11326 | An issue was discovered on Topcon Positioning Net-G5 GNSS Receiver devices with firmware 5.2.2. The web interface of the product is protected by a login. A guest is allowed to login. Once logged in as a guest, an attacker can browse a URL to read the password of the administrative user. The same procedure allows a regular user to gain administrative privileges. The guest login is possible in the default configuration. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
50% (1) | CWE-425 | Direct Request ('Forced Browsing') |
50% (1) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |