Browse all 7 CVE security advisories affecting Anritsu. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Anritsu provides test and measurement solutions for telecommunications and networking industries, focusing on equipment validation and network optimization. Historically, their products have faced vulnerabilities including remote code execution, cross-site scripting, and privilege escalation, often stemming from web interfaces and network services. While no major public security incidents have been widely reported, the 7 CVEs on record highlight potential risks in their testing and monitoring equipment. Security researchers have identified issues in web-based management interfaces and communication protocols that could allow unauthorized access or system compromise. Organizations using Anritsu solutions should implement proper network segmentation and regular patching to mitigate these potential security weaknesses.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-15351 | Anritsu VectorStar CHX File Parsing Deserialization of Untrusted Data Remote Code Execution Vulnerability — VectorStarCWE-502 | 7.8 | - | 2026-01-23 |
| CVE-2025-15350 | Anritsu VectorStar CHX File Parsing Deserialization of Untrusted Data Remote Code Execution Vulnerability — VectorStarCWE-502 | 7.8 | - | 2026-01-23 |
This page lists every published CVE security advisory associated with Anritsu. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.