Browse all 4 CVE security advisories affecting Alcatel-Lucent. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Alcatel-Lucent develops telecommunications networking equipment and software solutions for service providers and enterprises. Historically, their products have been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from improper input validation and authentication flaws. The company has faced security incidents including breaches affecting enterprise customers and vulnerabilities in core networking platforms that could enable unauthorized network access or service disruption. While specific major incidents are not widely documented, the presence of multiple CVEs indicates ongoing security challenges in their complex software ecosystems, requiring continuous patch management and security hardening measures for deployed systems.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-52690 | Command Injection Vulnerability in the OmniAccess Stellar over UDP Service — OmniAccess Stellar ProductsCWE-77 | 8.1 | High | 2025-07-16 |
| CVE-2025-52689 | Weak Session ID Check in the OmniAccess Stellar Web Management Interface — OmniAccess Stellar ProductsCWE-384 | 9.8 | Critical | 2025-07-16 |
| CVE-2025-52688 | Command Injection Vulnerability in the OmniAccess Stellar Web Management Interface — OmniAccess Stellar ProductsCWE-77 | 9.8 | Critical | 2025-07-16 |
| CVE-2025-52687 | JavaScript Injection Vulnerability in the OmniAccess Stellar Web Management Interface — OmniAccess StellarCWE-77 | 2.4 | Low | 2025-07-16 |
This page lists every published CVE security advisory associated with Alcatel-Lucent. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.