Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-28814— Path traversal in Carlo Gavazzi UWP 3.0 could lead to full device access

CVSS 9.8 · Critical EPSS 1.17% · P79
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-28814

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Path traversal in Carlo Gavazzi UWP 3.0 could lead to full device access
Source: NVD (National Vulnerability Database)
Vulnerability Description
Carlo Gavazzi UWP3.0 in multiple versions and CPY Car Park Server in Version 2.8.3 was discovered to be vulnerable to a relative path traversal vulnerability which enables remote attackers to read arbitrary files and gain full control of the device.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
相对路径遍历
Source: NVD (National Vulnerability Database)
Vulnerability Title
Carlo Gavazzi UWP 路径遍历漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Carlo Gavazzi UWP是Carlo Gavazzi公司的一个监控通用 Web 平台。用于楼宇自动化、能效绩效管理和停车场引导等应用。 Carlo Gavazzi UWP3.0存在路径遍历漏洞,远程攻击者利用该漏洞能够读取任意文件并获得对设备的完全控制权,以下产品和版本受到影响:CPY Car Park Server 2.8.3之前版本、UWP 3.0 Monitoring Gateway and Controller 8.5.0.3之前版本、UWP 3.0 Monitoring Gateway
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

II. Public POCs for CVE-2022-28814

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-28814

登录查看更多情报信息。

Same Patch Batch · Carlo Gavazzi · 2022-09-28 · 11 CVEs total

CVE-2022-225229.8 CRITICALHard-coded credentials in Carlo Gavazzi UWP3.0 allows for authentication bypass and full c
CVE-2022-225269.8 CRITICALMissing authentication for API in Carlo Gavazzi UWP 3.0 Car Park Server
CVE-2022-288119.8 CRITICALPossible command injection in Car Park Server in Carlo Gavazzi UWP3.0
CVE-2022-288129.8 CRITICALUse of Hard-coded Credentials in UWP3.0 allows SuperUser authentication bypass in Car Park
CVE-2022-225249.4 CRITICALSQL-injection in Carlo Gavazzi UWP 3.0 allows for full database access
CVE-2022-225237.5 HIGHCarlo Gavazzi UWP 3.0 WebApp allows for authentication bypass
CVE-2022-288137.5 HIGHSQL-injection in Car Park Server 3.0 allows for full database access.
CVE-2022-225257.2 HIGHCommand injection in restore function of Carlo Gavazzi UWP3.0 allows for command injection
CVE-2022-288166.1 MEDIUMReflected XSS in Carlo Gavazzi UWP 3.0
CVE-2022-288152.7 LOWSQL-Injection in Carlo Gavazzi UWP 3.0 Sentilo Proxy

IV. Related Vulnerabilities

V. Comments for CVE-2022-28814

No comments yet


Leave a comment