Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

2N Telekomunikace a.s. — Vulnerabilities & Security Advisories 5

Browse all 5 CVE security advisories affecting 2N Telekomunikace a.s.. AI-powered Chinese analysis, POCs, and references for each vulnerability.

2N Telekomunikace a.s. develops IP intercoms, VoIP gateways, and access control systems for enterprise and security applications. Historically, their products have faced vulnerabilities including remote code execution, cross-site scripting, and privilege escalation, often stemming from improper input validation and insecure default configurations. While no major public security incidents have been widely documented, the company's CVE history reflects common IoT security challenges, particularly in web interfaces and firmware updates. Their security posture has gradually improved with regular patch releases, though legacy devices may remain exposed to known exploits.

Top products by 2N Telekomunikace a.s.: 2N Access Commander
CVE IDTitleCVSSSeverityPublished
CVE-2025-59787 HTTP 5XX Internal Server Errors — 2N Access CommanderCWE-703 8.6AIHighAI2026-03-04
CVE-2025-59786 Cookies are not Invalidated upon Logout and Password Change — 2N Access CommanderCWE-613 6.5AIMediumAI2026-03-04
CVE-2025-59785 API - Insufficient Input Validation — 2N Access CommanderCWE-1286 4.9AIMediumAI2026-03-04
CVE-2025-59784 Log Pollution - Control Characters Not Escaped — 2N Access CommanderCWE-117 6.5AIMediumAI2026-03-04
CVE-2025-59783 OS Command Injection over API — 2N Access CommanderCWE-78 7.2AIHighAI2026-03-04

This page lists every published CVE security advisory associated with 2N Telekomunikace a.s.. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.