Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| MB connect line | mbNET.mini | 0.0.0 ~ 2.2.13 | - | |
| Helmholz | REX100 | 0.0.0 ~ 2.2.13 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2024-45274 | 9.8 CRITICAL | MB connect line/Helmholz: Remote code execution via confnet service |
| CVE-2024-45273 | 8.4 HIGH | MB connect line/Helmholz: Weak encryption of configuration file |
| CVE-2024-45271 | 8.4 HIGH | MB connect line/Helmholz: Remote code execution due to improper input validation |
| CVE-2024-45272 | 7.5 HIGH | MB connect line/Helmholz: Generation of weak passwords vulnerability |
| CVE-2024-45276 | 7.5 HIGH | MB connect line/Helmholz: tmp directory exposed via webservice |
No comments yet