Product:

Riskbuster_firmware

(Ecoa)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 13
Date Id Summary Products Score Patch Annotated
2021-09-30 CVE-2021-41291 ECOA BAS controller suffers from a path traversal content disclosure vulnerability. Using the GET parameter in File Manager, unauthenticated attackers can remotely disclose directory content on the affected device. Ecs_router_controller\-Ecs_firmware, Riskbuster_firmware, Riskterminator N/A
2021-09-30 CVE-2021-41290 ECOA BAS controller suffers from an arbitrary file write and path traversal vulnerability. Using the POST parameters, unauthenticated attackers can remotely set arbitrary values for location and content type and gain the possibility to execute arbitrary code on the affected device. Ecs_router_controller\-Ecs_firmware, Riskbuster_firmware, Riskterminator N/A
2021-09-30 CVE-2021-41292 ECOA BAS controller suffers from an authentication bypass vulnerability. An unauthenticated attacker through cookie poisoning can remotely bypass authentication and disclose sensitive information and circumvent physical access controls in smart homes and buildings and manipulate HVAC. Ecs_router_controller\-Ecs_firmware, Riskbuster_firmware, Riskterminator 9.1
2021-09-30 CVE-2021-41293 ECOA BAS controller suffers from a path traversal vulnerability, causing arbitrary files disclosure. Using the specific POST parameter, unauthenticated attackers can remotely disclose arbitrary files on the affected device and disclose sensitive and system information. Ecs_router_controller\-Ecs_firmware, Riskbuster_firmware, Riskterminator N/A
2021-09-30 CVE-2021-41294 ECOA BAS controller suffers from a path traversal vulnerability, causing arbitrary files deletion. Using the specific GET parameter, unauthenticated attackers can remotely delete arbitrary files on the affected device and cause denial of service scenario. Ecs_router_controller\-Ecs_firmware, Riskbuster_firmware, Riskterminator 9.1
2021-09-30 CVE-2021-41295 ECOA BAS controller has a Cross-Site Request Forgery vulnerability, thus authenticated attacker can remotely place a forged request at a malicious web page and execute CRUD commands (GET, POST, PUT, DELETE) to perform arbitrary operations in the system. Ecs_router_controller\-Ecs_firmware, Riskbuster_firmware, Riskterminator N/A
2021-09-30 CVE-2021-41296 ECOA BAS controller uses weak set of default administrative credentials that can be easily guessed in remote password attacks and gain full control of the system. Ecs_router_controller\-Ecs_firmware, Riskbuster_firmware, Riskterminator N/A
2021-09-30 CVE-2021-41297 ECOA BAS controller is vulnerable to weak access control mechanism allowing authenticated user to remotely escalate privileges by disclosing credentials of administrative accounts in plain-text. Ecs_router_controller\-Ecs_firmware, Riskbuster_firmware, Riskterminator N/A
2021-09-30 CVE-2021-41298 ECOA BAS controller is vulnerable to insecure direct object references that occur when the application provides direct access to objects based on user-supplied input. As a result of this vulnerability, attackers with general user's privilege can remotely bypass authorization and access the hidden resources in the system and execute privileged functionalities. Ecs_router_controller\-Ecs_firmware, Riskbuster_firmware, Riskterminator N/A
2021-09-30 CVE-2021-41299 ECOA BAS controller is vulnerable to hard-coded credentials within its Linux distribution image, thus remote attackers can obtain administrator’s privilege without logging in. Ecs_router_controller\-Ecs_firmware, Riskbuster_firmware, Riskterminator N/A