Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Copeland LP | E3 Supervisory Control | 0 ~ 2.31F01 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2025-52547 | DoS to the application services | |
| CVE-2025-52550 | Firmware upgrade packages are unsigned | |
| CVE-2025-52544 | Arbitrary read file from the filesystem | |
| CVE-2025-52543 | Login to the application services using only the password hash | |
| CVE-2025-52548 | Enabling SSH and Shellinabox on the vulnerable machine | |
| CVE-2025-52545 | Privilege escalation in the application services | |
| CVE-2025-52546 | Stored XSS by uploading a specially crafted floor plan file | |
| CVE-2025-52551 | Proprietary protocol allows for unauthenticated file operations | |
| CVE-2025-52549 | Predictable root linux password generation |
No comments yet