Browse all 5 CVE security advisories affecting Allied Telesis K.K.. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Allied Telesis K.K. develops networking infrastructure solutions, including switches and routers, for enterprise and service provider environments. Historically, their products have been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from improper input validation and authentication flaws. While no major public security incidents have been widely documented, the five CVEs on record highlight potential risks in their web interfaces and firmware implementations. Security researchers have identified weaknesses in default configurations and insufficient access controls, emphasizing the need for regular patching and hardening of Allied Telesis devices in production environments.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2022-38394 | Allied Telesis CentreCOM AR260S 信任管理问题漏洞 — CentreCOM AR260S V2 | 9.8 | - | 2022-09-08 |
| CVE-2022-38094 | Allied Telesis CentreCOM AR260S 操作系统命令注入漏洞 — CentreCOM AR260S V2 | 8.8 | - | 2022-09-08 |
| CVE-2022-35273 | Allied Telesis CentreCOM AR260S 操作系统命令注入漏洞 — CentreCOM AR260S V2 | 8.8 | - | 2022-09-08 |
| CVE-2022-34869 | Allied Telesis CentreCOM AR260S 安全漏洞 — CentreCOM AR260S V2 | 8.8 | - | 2022-09-08 |
| CVE-2017-2125 | CentreCOM AR260S V2 权限许可和访问控制问题漏洞 — CentreCOM | 8.8 | - | 2017-04-28 |
This page lists every published CVE security advisory associated with Allied Telesis K.K.. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.