Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-8108— Fuji Electric Tellus Exposed Dangerous Method or Function

CVSS 7.8 · High EPSS 0.01% · P0
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-8108

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Fuji Electric Tellus Exposed Dangerous Method or Function
Source: NVD (National Vulnerability Database)
Vulnerability Description
The installation of Fuji Tellus adds a driver to the kernel which grants all users read and write permissions.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
暴露危险的方法或函数
Source: NVD (National Vulnerability Database)
Vulnerability Title
Fuji Electric Fuji Tellus 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Fuji Electric Fuji Tellus是日本Fuji Electric公司的一个面向工业自动化与生产设备监控场景的人机界面与控制平台。 Fuji Electric Fuji Tellus存在安全漏洞,该漏洞源于安装过程向内核添加驱动程序,授予所有用户读写权限。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Fuji ElectricTellus 5.0.2 -

II. Public POCs for CVE-2026-8108

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-8108

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2026-8108

No comments yet


Leave a comment