Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Aethon — Vulnerabilities & Security Advisories 5

Browse all 5 CVE security advisories affecting Aethon. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Aethon develops autonomous mobile robots for logistics and healthcare automation, primarily used for material transport and inventory management. Historically, the organization's products have been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from insufficient input validation and insecure default configurations. Notable security characteristics include exposed network services and inadequate authentication mechanisms. While no major public incidents have been widely documented, the five CVEs on record highlight consistent weaknesses in web interfaces and communication protocols that could allow unauthorized access or system compromise.

Found 5 results / 5Clear Filters
Top products by Aethon: TUG Home Base Server
CVE IDTitleCVSSSeverityPublished
CVE-2022-27494 CROSS-SITE SCRIPTING CWE-79 — TUG Home Base Server 8.2 High2022-10-21
CVE-2022-1070 CHANNEL ACCESSIBLE BY NON-ENDPOINT CWE-300 — TUG Home Base Server 8.2 High2022-10-21
CVE-2022-1059 CROSS-SITE SCRIPTING CWE-79 — TUG Home Base Server 8.2 High2022-10-21
CVE-2022-26423 MISSING AUTHORIZATION CWE-862 — TUG Home Base Server 8.2 High2022-10-21
CVE-2022-1066 MISSING AUTHORIZATION CWE-862 — TUG Home Base Server 8.2 High2022-10-21

This page lists every published CVE security advisory associated with Aethon. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.