Browse all 5 CVE security advisories affecting 2N Telekomunikace a.s.. AI-powered Chinese analysis, POCs, and references for each vulnerability.
2N Telekomunikace a.s. develops IP intercoms, VoIP gateways, and access control systems for enterprise and security applications. Historically, their products have faced vulnerabilities including remote code execution, cross-site scripting, and privilege escalation, often stemming from improper input validation and insecure default configurations. While no major public security incidents have been widely documented, the company's CVE history reflects common IoT security challenges, particularly in web interfaces and firmware updates. Their security posture has gradually improved with regular patch releases, though legacy devices may remain exposed to known exploits.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-59787 | HTTP 5XX Internal Server Errors — 2N Access CommanderCWE-703 | 8.6AI | HighAI | 2026-03-04 |
| CVE-2025-59786 | Cookies are not Invalidated upon Logout and Password Change — 2N Access CommanderCWE-613 | 6.5AI | MediumAI | 2026-03-04 |
| CVE-2025-59785 | API - Insufficient Input Validation — 2N Access CommanderCWE-1286 | 4.9AI | MediumAI | 2026-03-04 |
| CVE-2025-59784 | Log Pollution - Control Characters Not Escaped — 2N Access CommanderCWE-117 | 6.5AI | MediumAI | 2026-03-04 |
| CVE-2025-59783 | OS Command Injection over API — 2N Access CommanderCWE-78 | 7.2AI | HighAI | 2026-03-04 |
This page lists every published CVE security advisory associated with 2N Telekomunikace a.s.. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.