Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Mobile Industrial Robots A/S | MiR100 | v2.8.1.1 and before | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2020-10269 | RVD#2566: Hardcoded Credentials on MiRX00 wireless Access Point | |
| CVE-2020-10270 | RVD#2557: Hardcoded Credentials on MiRX00 Control Dashboard | |
| CVE-2020-10271 | RVD#2555: MiR ROS computational graph is exposed to all network interfaces, including poor | |
| CVE-2020-10273 | RVD#2560: Unprotected intellectual property in Mobile Industrial Robots (MiR) controllers | |
| CVE-2020-10274 | RVD#2556: MiR REST API allows for data exfiltration by unauthorized attackers (e.g. indoor | |
| CVE-2020-10275 | RVD#2565: Weak token generation for the REST API. | |
| CVE-2020-10276 | RVD#2558: Default credentials on SICK PLC allows disabling safety features | |
| CVE-2020-10277 | RVD#2562: Booting from a live image leads to exfiltration of sensible information and priv | |
| CVE-2020-10278 | RVD#2561: Unprotected BIOS allows user to boot from live OS image. | |
| CVE-2020-10279 | RVD#2569: Insecure operating system defaults in MiR robots | |
| CVE-2020-10280 | RVD#2568: Apache server is vulnerable to a DoS |
No comments yet