Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Phoenix Contact | WHA-GW-F2D2-0-AS- Z2-ETH | 3.0.9 ~ 3.0.9 | - | |
| Phoenix Contact | WHA-GW-F2D2-0-AS- Z2-ETH.EIP | 3.0.9 ~ 3.0.9 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2021-34565 | 9.8 CRITICAL | In WirelessHART-Gateway versions 3.0.7 to 3.0.9 hard-coded credentials have been found |
| CVE-2021-34561 | 7.5 HIGH | A vulnerability in WirelessHART-Gateway <= 3.0.8 allows to bypass any IP or firewall based |
| CVE-2021-33555 | 7.5 HIGH | A vulnerability may allow remote attackers to read arbitrary files on the server of the Wi |
| CVE-2021-34564 | 5.5 MEDIUM | In WirelessHART-Gateway versions 3.0.9 a vulnerability allows to read and write sensitive |
| CVE-2021-34562 | 5.4 MEDIUM | A vulnerability in WirelessHART-Gateway 3.0.8 it is possible to inject arbitrary JavaScrip |
| CVE-2021-34559 | 5.4 MEDIUM | A vulnerability in WirelessHART-Gateway <= 3.0.8 may allow remote attackers to rewrite lin |
| CVE-2021-34563 | 3.3 LOW | In WirelessHART-Gateway versions 3.0.8 and 3.0.9 the HttpOnly flag is missing in a cookie |
No comments yet